Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
08/06/2023, 16:48
230608-vbj64agh89 708/06/2023, 16:26
230608-txggnahe5v 708/06/2023, 15:56
230608-tdqafsgf57 7Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/06/2023, 16:48
Behavioral task
behavioral1
Sample
yuki_v.3.exe
Resource
win7-20230220-en
General
-
Target
yuki_v.3.exe
-
Size
8.2MB
-
MD5
afa5db1116562cbb00f823e89b002ab6
-
SHA1
8f74ba65d0eb2ea8f1c1b8d32739aa094261c1aa
-
SHA256
4474fe631a42d5f9d1d3d2cb4196c370ffd8f1f5c724ce2cf974ae9ec0a02ab0
-
SHA512
78f888b4fd99170a5457006762b60aacb85470173cf3143833ffd7419f1a569f9d5c337530a864816d11c20f3f116545647e1fc206d2bb807ebdfeda51521fbd
-
SSDEEP
196608:EVxwZmL2Vmd6+D3c/f/+SrEU/e9lLh5E1wtJ79dnNnCZ:YPL2Vmd6m3c/eE7G99qITTC
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1288 yuki_v.3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1288 1296 yuki_v.3.exe 29 PID 1296 wrote to memory of 1288 1296 yuki_v.3.exe 29 PID 1296 wrote to memory of 1288 1296 yuki_v.3.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81