Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1795s -
max time network
1806s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win11-20240221-en
General
-
Target
ThunderSoft Flash to Video Converter 5.2.0.exe
-
Size
16.6MB
-
MD5
23ba577cf7061da608cbcf5827dbfe13
-
SHA1
fe4fef8a84142c5138b3ac12e5df2fb182bc4c33
-
SHA256
f5dbc0ed5238807fd7a05f563e6f6c215708f2ef4f35b2b957659f88fbf52e60
-
SHA512
90a71b5cd44626cff146802adf644e0816eb9974850e726b1e7f8e66ae7d56d562459d48b9106f6f7b0182ff4513cdb783ae9a806583b9e6fbdd518e6f6d5e51
-
SSDEEP
393216:WIBjNqG0llTzhmldMp3dbtD1rzBx4Ol4l16Vh5MaW7vooZ9vVRB:PsDhml6p39thhxK16VE9voo3B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Loads dropped DLL 4 IoCs
pid Process 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp 4868 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4868 5056 ThunderSoft Flash to Video Converter 5.2.0.exe 95 PID 5056 wrote to memory of 4868 5056 ThunderSoft Flash to Video Converter 5.2.0.exe 95 PID 5056 wrote to memory of 4868 5056 ThunderSoft Flash to Video Converter 5.2.0.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\is-T98M6.tmp\ThunderSoft Flash to Video Converter 5.2.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-T98M6.tmp\ThunderSoft Flash to Video Converter 5.2.0.tmp" /SL5="$9020E,17046573,67072,C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3688 --field-trial-handle=3112,i,1786399861560734457,5606877702857066305,262144 --variations-seed-version /prefetch:81⤵PID:4908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1268 --field-trial-handle=3112,i,1786399861560734457,5606877702857066305,262144 --variations-seed-version /prefetch:81⤵PID:3568
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD586a1311d51c00b278cb7f27796ea442e
SHA1ac08ac9d08f8f5380e2a9a65f4117862aa861a19
SHA256e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d
SHA512129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2
-
Filesize
913KB
MD530571cb5b76edfa481dc52346ec8526c
SHA10f1ac53282a6adf0388ef65f45a967447e65b685
SHA256d2713609b5c74e889b38a4ee7853da7b5a0dc99cab6c7011d592661cb0697212
SHA512f690066f6526398c80b17c0e2d572a8b6e1a7d3e56279f5b23b72a030808bfae9dd756667e557aeb6313459e9c10836214acfda19de1aaf209bd92bf49be215c