Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2023, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe
Resource
win10v2004-20221111-en
General
-
Target
829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe
-
Size
2.1MB
-
MD5
78da0b431c4cd57e77463c406c0eeddd
-
SHA1
80e8ff76e99ceae24dc0de565a75c398998231ff
-
SHA256
829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09
-
SHA512
5eaab3a4a06f13beb2005502936964dcedf6a50d5582c9d11eb7a1f249eece0029ead9bcbc52f731986beede13d045936b00832a1f5e97504246505dbf681ffb
-
SSDEEP
49152:kJ9UZdYZzdjjw9gIebs6ssEIkRuU8tU6++z/PksaX:kJ9MYBdw9Ms6PBeuU8tU4LksaX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4184 YShow3D.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4184 YShow3D.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4184 2400 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe 81 PID 2400 wrote to memory of 4184 2400 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe 81 PID 2400 wrote to memory of 4184 2400 829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe"C:\Users\Admin\AppData\Local\Temp\829152de53914886e2cdbfb917efd0446d97bc1527b6f975f940e338411d8b09.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\YShow3D.exeC:\Users\Admin\AppData\Local\Temp\\YShow3D.exe /i ÕÒ²»µ½Ö¸¶¨µÄ¼ÓÃÜËø£¡ /t ÌáʾÐÅÏ¢£º /k 162⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4184
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5c35d485156928ccc9561d056e1e146ee
SHA17901dd46d231a741e65d105c22e7f289fc35169a
SHA2560d9d9a9165bc551263f83309fee109b6da5ab1977ab0941166c934f96965b5b9
SHA512dcf3c60e3cd64a8023dc219a919c5ff430920ac85dca80802adb4b91d4cafe98b39c207d0e394a2535aa9f4c194e0f3ff1a4fd8b7a69e0c3c51b15fb0d796175
-
Filesize
60KB
MD5c35d485156928ccc9561d056e1e146ee
SHA17901dd46d231a741e65d105c22e7f289fc35169a
SHA2560d9d9a9165bc551263f83309fee109b6da5ab1977ab0941166c934f96965b5b9
SHA512dcf3c60e3cd64a8023dc219a919c5ff430920ac85dca80802adb4b91d4cafe98b39c207d0e394a2535aa9f4c194e0f3ff1a4fd8b7a69e0c3c51b15fb0d796175