Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1792s -
max time network
1600s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win11-20240221-en
General
-
Target
ThunderSoft Flash to Video Converter 5.2.0.exe
-
Size
16.6MB
-
MD5
23ba577cf7061da608cbcf5827dbfe13
-
SHA1
fe4fef8a84142c5138b3ac12e5df2fb182bc4c33
-
SHA256
f5dbc0ed5238807fd7a05f563e6f6c215708f2ef4f35b2b957659f88fbf52e60
-
SHA512
90a71b5cd44626cff146802adf644e0816eb9974850e726b1e7f8e66ae7d56d562459d48b9106f6f7b0182ff4513cdb783ae9a806583b9e6fbdd518e6f6d5e51
-
SSDEEP
393216:WIBjNqG0llTzhmldMp3dbtD1rzBx4Ol4l16Vh5MaW7vooZ9vVRB:PsDhml6p39thhxK16VE9voo3B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Loads dropped DLL 4 IoCs
pid Process 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp 2188 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2188 1208 ThunderSoft Flash to Video Converter 5.2.0.exe 73 PID 1208 wrote to memory of 2188 1208 ThunderSoft Flash to Video Converter 5.2.0.exe 73 PID 1208 wrote to memory of 2188 1208 ThunderSoft Flash to Video Converter 5.2.0.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\is-4LBDK.tmp\ThunderSoft Flash to Video Converter 5.2.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-4LBDK.tmp\ThunderSoft Flash to Video Converter 5.2.0.tmp" /SL5="$300DE,17046573,67072,C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
913KB
MD530571cb5b76edfa481dc52346ec8526c
SHA10f1ac53282a6adf0388ef65f45a967447e65b685
SHA256d2713609b5c74e889b38a4ee7853da7b5a0dc99cab6c7011d592661cb0697212
SHA512f690066f6526398c80b17c0e2d572a8b6e1a7d3e56279f5b23b72a030808bfae9dd756667e557aeb6313459e9c10836214acfda19de1aaf209bd92bf49be215c
-
Filesize
66KB
MD586a1311d51c00b278cb7f27796ea442e
SHA1ac08ac9d08f8f5380e2a9a65f4117862aa861a19
SHA256e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d
SHA512129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec
-
Filesize
1.2MB
MD5cd012a1d5ef9a1c5194207b1e4db1600
SHA160011ee2d2d14e80f1f1b9424f4cdb300a1e576b
SHA2560f1243d11845464c45dc7b5dd8703af86c43d16d5dcce453868fd8163612fca1
SHA51282686691d8820bddb04f6d10f13418a1d70a5097a01766105d348ed9a71089793a09ec3543061a38194cb8c4bc6c9d08481c6aea8a75a6f146cb57a296ec6139
-
Filesize
881KB
MD54cc2504f28ec6846a5a9c7bb7518dd8d
SHA1b4a655e889d4ff23d028ac58371ce782481b6e29
SHA2566ae75881457628fd5995a971a8b63bd6aee3df8f6e1be6b4e5a0eb85c4a6fb6d
SHA512e14807e584a8dafcd9275fbff006219b28db9d05ddee1eca3a35236e7ce3e537abd4b45c9f824aaafc8a086e1e2be3c8cebf843f77af53be4f9047c9e8cdd5c0