Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1798s -
max time network
1166s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
ThunderSoft Flash to Video Converter 5.2.0.exe
Resource
win11-20240221-en
General
-
Target
ThunderSoft Flash to Video Converter 5.2.0.exe
-
Size
16.6MB
-
MD5
23ba577cf7061da608cbcf5827dbfe13
-
SHA1
fe4fef8a84142c5138b3ac12e5df2fb182bc4c33
-
SHA256
f5dbc0ed5238807fd7a05f563e6f6c215708f2ef4f35b2b957659f88fbf52e60
-
SHA512
90a71b5cd44626cff146802adf644e0816eb9974850e726b1e7f8e66ae7d56d562459d48b9106f6f7b0182ff4513cdb783ae9a806583b9e6fbdd518e6f6d5e51
-
SSDEEP
393216:WIBjNqG0llTzhmldMp3dbtD1rzBx4Ol4l16Vh5MaW7vooZ9vVRB:PsDhml6p39thhxK16VE9voo3B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Loads dropped DLL 4 IoCs
pid Process 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp 1180 ThunderSoft Flash to Video Converter 5.2.0.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 716 wrote to memory of 1180 716 ThunderSoft Flash to Video Converter 5.2.0.exe 83 PID 716 wrote to memory of 1180 716 ThunderSoft Flash to Video Converter 5.2.0.exe 83 PID 716 wrote to memory of 1180 716 ThunderSoft Flash to Video Converter 5.2.0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\is-H8OMM.tmp\ThunderSoft Flash to Video Converter 5.2.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-H8OMM.tmp\ThunderSoft Flash to Video Converter 5.2.0.tmp" /SL5="$5023E,17046573,67072,C:\Users\Admin\AppData\Local\Temp\ThunderSoft Flash to Video Converter 5.2.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1180
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
913KB
MD530571cb5b76edfa481dc52346ec8526c
SHA10f1ac53282a6adf0388ef65f45a967447e65b685
SHA256d2713609b5c74e889b38a4ee7853da7b5a0dc99cab6c7011d592661cb0697212
SHA512f690066f6526398c80b17c0e2d572a8b6e1a7d3e56279f5b23b72a030808bfae9dd756667e557aeb6313459e9c10836214acfda19de1aaf209bd92bf49be215c
-
Filesize
66KB
MD586a1311d51c00b278cb7f27796ea442e
SHA1ac08ac9d08f8f5380e2a9a65f4117862aa861a19
SHA256e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d
SHA512129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec
-
Filesize
1.0MB
MD5741f415de0d8f28cdb265e819b1a87f6
SHA199889d25ef796178e74b4d9cee4560fff3603d3d
SHA256e02c1dcf16f6d6754013772735f6de7958112bee7f4e6161f39c456eab1b2692
SHA512dff52964ff38789a685f182690c47a5507d29208ca4e78c9ef64209fb150673adde1f3ff383094c02d6e7a087840f731797e44e6774c7c9a312ea054d5742ae1
-
Filesize
960KB
MD5b4298cd122707f31973ee1c9ad72bca5
SHA1ad28c4b269f2894c8ef2c2be1ca386a9cec8d87a
SHA2564f3ee54af5164033866bfbfe2156436856df7e943724564e64ecd3c544f42228
SHA512fbfc6ba579300eb3e4f42b474843c508c1c8242407f20a7bd35caa4f7b8ed0bc97f36edbb307ed8142b28445fe57cc0f37b4e376f785f45e8b4d5b84fa56e1ab