Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7智智加�...ok.dll
windows7-x64
7智智加�...ok.dll
windows10-2004-x64
7智智加�...��.url
windows7-x64
1智智加�...��.url
windows10-2004-x64
1智智加�...��.exe
windows7-x64
7智智加�...��.exe
windows10-2004-x64
7智智加�...��.url
windows7-x64
1智智加�...��.url
windows10-2004-x64
1智智加�...��.url
windows7-x64
1智智加�...��.url
windows10-2004-x64
1智智加�...��.url
windows7-x64
1智智加�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 00:54
Behavioral task
behavioral1
Sample
智智加强版抓包工具/WSockHook.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
智智加强版抓包工具/WSockHook.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
智智加强版抓包工具/快车2代.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
智智加强版抓包工具/快车2代.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
智智加强版抓包工具/智智抓包工具.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
智智加强版抓包工具/智智抓包工具.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
智智加强版抓包工具/红软基地.url
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
智智加强版抓包工具/红软基地.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
智智加强版抓包工具/说明.url
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
智智加强版抓包工具/说明.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
智智加强版抓包工具/金山毒霸2008免费使用.url
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
智智加强版抓包工具/金山毒霸2008免费使用.url
Resource
win10v2004-20240226-en
General
-
Target
智智加强版抓包工具/WSockHook.dll
-
Size
24KB
-
MD5
58c2428e107ccc6f19b182f76f8b641b
-
SHA1
5a5827e59258c03f411321cfa25e3ccdca59dd76
-
SHA256
f5c859b72ce7e725b2d74866e7db87bd801170265cae4d437c4629c2c95d124d
-
SHA512
79362bea6dffca7ab9dcc0951362163deecd5c283fb974bae542610a81c958a011cb9d115e136544e1c7a8aeb99af39296a80ae5b287624672de131d0d937adb
-
SSDEEP
768:e/vzREda8A9E+RcfG//H8Y31Zf5Vxr14q:mziduYQ8YFZk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2616-0-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2616 1628 rundll32.exe 91 PID 1628 wrote to memory of 2616 1628 rundll32.exe 91 PID 1628 wrote to memory of 2616 1628 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\智智加强版抓包工具\WSockHook.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\智智加强版抓包工具\WSockHook.dll,#12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4172 --field-trial-handle=2588,i,14229658658073991926,6938034815163866135,262144 --variations-seed-version /prefetch:81⤵PID:776