Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
yujianxian.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
yujianxian.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240412-en
General
-
Target
yujianxian.exe
-
Size
76KB
-
MD5
5edee07364dde3bd48f08c434dfc2a7f
-
SHA1
52fd0c24ce3f7e356df85a4bf09e482b6604cc03
-
SHA256
e540242669001c8e9fb8baf592f87141ac41ea9ca1257ceac9c1252f3f5a4f69
-
SHA512
d89cf3b7679fb72fd613785fa754aa18d08c4c8ecaaeabaf31b5f7ac26b2261fa60b9d3e7ab54d6f97a5f2c4a16121d587d9f07d1175863a1676909bbf27e08c
-
SSDEEP
768:87wXhBmXD6d22+GsGJU+Ut9GN7kYnlYXhcmdIOevEmtnpH1bvUE9cXHCs:BRIXD6B7nyXhcmdIOesmtnZ1bRS31
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: yujianxian.exe File opened (read-only) \??\Y: yujianxian.exe File opened (read-only) \??\L: yujianxian.exe File opened (read-only) \??\M: yujianxian.exe File opened (read-only) \??\N: yujianxian.exe File opened (read-only) \??\P: yujianxian.exe File opened (read-only) \??\R: yujianxian.exe File opened (read-only) \??\E: yujianxian.exe File opened (read-only) \??\H: yujianxian.exe File opened (read-only) \??\I: yujianxian.exe File opened (read-only) \??\S: yujianxian.exe File opened (read-only) \??\U: yujianxian.exe File opened (read-only) \??\W: yujianxian.exe File opened (read-only) \??\Q: yujianxian.exe File opened (read-only) \??\T: yujianxian.exe File opened (read-only) \??\X: yujianxian.exe File opened (read-only) \??\V: yujianxian.exe File opened (read-only) \??\Z: yujianxian.exe File opened (read-only) \??\J: yujianxian.exe File opened (read-only) \??\K: yujianxian.exe File opened (read-only) \??\O: yujianxian.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2244 yujianxian.exe