Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 13:07

General

  • Target

    3749239871d1967c508845009be30d03.exe

  • Size

    96KB

  • MD5

    3749239871d1967c508845009be30d03

  • SHA1

    f1a015f646233b4e1956e904c9d067774df35f1a

  • SHA256

    02b282e849ae6fceee2fd788aecff2c4fdacf08ba1a09de0b421f2086f8a65f8

  • SHA512

    87013e4dcd75eb5b4dc5a854192f7067d7b4da7c1fc704455b6d75a47bcb1dee7cee065e89d8406939d01e0c2d1f5b3fa92f0822f778a64ed2aa477b2c047600

  • SSDEEP

    1536:iohBHef6cOahokGulSc16l6u+NMMl/KlYv1T4hThFNNIjni:9IhRlu88FFNCni

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3749239871d1967c508845009be30d03.exe
    "C:\Users\Admin\AppData\Local\Temp\3749239871d1967c508845009be30d03.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\yiiyao.exe
      "C:\Users\Admin\yiiyao.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yiiyao.exe

    Filesize

    92KB

    MD5

    28a437078d5840b47284c8d590adc8ce

    SHA1

    09832b90f1dc3a4879ed7647af8766a83626feab

    SHA256

    ead8acb6c9bc32ef7eff23a43146a3dd505ab88c69823770ae105beba739f7a3

    SHA512

    f3be128909adc79bc1e4c7fd2a6897ac132583177209b6a62d16bf26ebf1d6cba1eb2e6ebeaa7dc6e1077739c128febe3ab5406f848eca63689cec787ddd5f3a

  • C:\Users\Admin\yiiyao.exe

    Filesize

    96KB

    MD5

    2cc2c5f6ad7b8199d26544f10aa25fe7

    SHA1

    76c74778a3e249c52294d1032cdb1c72888ed035

    SHA256

    735315cf09977d5efec0b18cb537174bc0b835be3f7d6c44c34d0028ac1162fb

    SHA512

    cf8a22df1608579a1310109ecd95792bdc5509039b368a28865e0fd6dcd75ea35b0919d26202f2fe418ea7267db8e7453478a57afc947087bed443dc0d9b55ff