Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe
Resource
win10v2004-20221111-en
General
-
Target
829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe
-
Size
2.1MB
-
MD5
78da0b431c4cd57e77463c406c0eeddd
-
SHA1
80e8ff76e99ceae24dc0de565a75c398998231ff
-
SHA256
829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09
-
SHA512
5eaab3a4a06f13beb2005502936964dcedf6a50d5582c9d11eb7a1f249eece0029ead9bcbc52f731986beede13d045936b00832a1f5e97504246505dbf681ffb
-
SSDEEP
49152:kJ9UZdYZzdjjw9gIebs6ssEIkRuU8tU6++z/PksaX:kJ9MYBdw9Ms6PBeuU8tU4LksaX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1196 YShow3D.exe -
Loads dropped DLL 2 IoCs
pid Process 1744 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe 1744 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1196 YShow3D.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1196 1744 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe 28 PID 1744 wrote to memory of 1196 1744 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe 28 PID 1744 wrote to memory of 1196 1744 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe 28 PID 1744 wrote to memory of 1196 1744 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe"C:\Users\Admin\AppData\Local\Temp\829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\YShow3D.exeC:\Users\Admin\AppData\Local\Temp\\YShow3D.exe /i ÕÒ²»µ½Ö¸¶¨µÄ¼ÓÃÜËø£¡ /t ÌáʾÐÅÏ¢£º /k 162⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5c35d485156928ccc9561d056e1e146ee
SHA17901dd46d231a741e65d105c22e7f289fc35169a
SHA2560d9d9a9165bc551263f83309fee109b6da5ab1977ab0941166c934f96965b5b9
SHA512dcf3c60e3cd64a8023dc219a919c5ff430920ac85dca80802adb4b91d4cafe98b39c207d0e394a2535aa9f4c194e0f3ff1a4fd8b7a69e0c3c51b15fb0d796175
-
Filesize
60KB
MD5c35d485156928ccc9561d056e1e146ee
SHA17901dd46d231a741e65d105c22e7f289fc35169a
SHA2560d9d9a9165bc551263f83309fee109b6da5ab1977ab0941166c934f96965b5b9
SHA512dcf3c60e3cd64a8023dc219a919c5ff430920ac85dca80802adb4b91d4cafe98b39c207d0e394a2535aa9f4c194e0f3ff1a4fd8b7a69e0c3c51b15fb0d796175
-
Filesize
60KB
MD5c35d485156928ccc9561d056e1e146ee
SHA17901dd46d231a741e65d105c22e7f289fc35169a
SHA2560d9d9a9165bc551263f83309fee109b6da5ab1977ab0941166c934f96965b5b9
SHA512dcf3c60e3cd64a8023dc219a919c5ff430920ac85dca80802adb4b91d4cafe98b39c207d0e394a2535aa9f4c194e0f3ff1a4fd8b7a69e0c3c51b15fb0d796175