Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/04/2023, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
filmora_setup_full7598.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
filmora_setup_full7598.exe
Resource
win10v2004-20230220-en
General
-
Target
filmora_setup_full7598.exe
-
Size
1.9MB
-
MD5
13dd51bc806ab1f1bde9484fc7fd6fef
-
SHA1
2e925afc31308a787cbe6691366675429ad597bf
-
SHA256
555c80afd45bc9a558a2af29044745fdb84a3c00900d6d47e5725971f260a006
-
SHA512
5238caede25c98a7a2b97f60728d6c5dc7fd1d2a4f049575a7bf204ccd4e941af6f9cb1f185e5e2421986cd4a947e5fbe55795dcd425ac9bc89fb665ea3a84db
-
SSDEEP
49152:ziDGQapGSAT03UF3+oSSzG/fvPrvfsTiY2o+NTZ7pKD:ziDGQrkkVNovPjw2o+Ng
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 NFWCHK.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 filmora_setup_full7598.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Control Panel\Desktop\MuiCached filmora_setup_full7598.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main filmora_setup_full7598.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1704 filmora_setup_full7598.exe 1704 filmora_setup_full7598.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2316 1704 filmora_setup_full7598.exe 29 PID 1704 wrote to memory of 2316 1704 filmora_setup_full7598.exe 29 PID 1704 wrote to memory of 2316 1704 filmora_setup_full7598.exe 29 PID 1704 wrote to memory of 2316 1704 filmora_setup_full7598.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\filmora_setup_full7598.exe"C:\Users\Admin\AppData\Local\Temp\filmora_setup_full7598.exe"1⤵
- Loads dropped DLL
- Modifies Control Panel
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe2⤵
- Executes dropped EXE
PID:2316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a329bb9e614b15e5f8c10fc18bdf213e
SHA1d3795379f0d505d448ec0ce3dd9d516501891361
SHA256f466c88013581317e0787f83148a85db29a55b827e989b192c5e315454bf0792
SHA51240c1786e923fbfd7df6c32fb93eb21f7bf26b2d1db11ce2968409e310886aaa3d31c4ffa1a36dd25a489293d4fccc7cd535facdb8640754ffa0e8d4ed1e1d2b1
-
Filesize
504B
MD5ef5a6192f9b572d604b3f3236f5cb72d
SHA12caaf8eb997d8a235e4e8cc69de1d9d6938ec8a7
SHA2567245d9590b0ca2309dcd127ee1ab9db3587f36cc9bf5eb02106bb8f410b6e25a
SHA5120bf2f1c14bb70df4785df66166a99cd98dede56235cd9bc34ee7ba756360b2a4f1c61a5d2b79239338262fb9309f2f9939823b7f2662534852c32e25851f26ec
-
Filesize
5KB
MD5d00fab5de1104186c53d23ff0c2bd6a7
SHA1e45cdfbea452fcb00ad850bf8a762ae319917fef
SHA2562b517153d340017849f697eb3d3ef5646f1ad1cd375a39ee9ffde4e7c1af3189
SHA51297dbf6dadafda75e093c146c33b75184adf5ca77f1aa936d55ec2b16401b0b40ddf95682610d450ae3e1a511b2831a056cdc45fb3611f1eba086e234b04a5cd5
-
Filesize
2KB
MD53034da17e7aa91f89f7d1cf75674c3bd
SHA134003057aec684204cca78dd3b85979e0b73537f
SHA256d6a43c8d435b98358dedb6e1af34d5f447494b92f957f3bc73f58c5e2cec56b6
SHA5121893372c4bc9ba118a701139abbd742ad75a5a1488cd558e0c81c2bd8f26caebcaa1870700b839b2ca57194287cd3d79f7dca58c891e53966a1dc8077f8e6929
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
229B
MD5ad0967a0ab95aa7d71b3dc92b71b8f7a
SHA1ed63f517e32094c07a2c5b664ed1cab412233ab5
SHA2569c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc
SHA51285766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a