Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Quest Game...1).zip
windows7-x64
1Quest Game...1).zip
windows10-2004-x64
1adb/AdbWinApi.dll
windows7-x64
3adb/AdbWinApi.dll
windows10-2004-x64
3adb/AdbWinUsbApi.dll
windows7-x64
3adb/AdbWinUsbApi.dll
windows10-2004-x64
3adb/adb.exe
windows7-x64
1adb/adb.exe
windows10-2004-x64
1com.anagan.qgp.apk
android-13-x64
1huiziyuan.net.url
windows7-x64
6huiziyuan.net.url
windows10-2004-x64
3全自动安装.exe
windows7-x64
7全自动安装.exe
windows10-2004-x64
7手动安�...��.txt
windows7-x64
1手动安�...��.txt
windows10-2004-x64
1Resubmissions
12/01/2024, 05:35
240112-gactqsgcf6 712/01/2024, 05:30
240112-f7lx8sfdbm 712/01/2024, 05:25
240112-f4aqssfcej 7Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 05:25
Behavioral task
behavioral1
Sample
Quest Games Optimizer 9.2.1 -NIF(1).zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Quest Games Optimizer 9.2.1 -NIF(1).zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
adb/AdbWinApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
adb/AdbWinApi.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
adb/AdbWinUsbApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
adb/AdbWinUsbApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
adb/adb.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
adb/adb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
com.anagan.qgp.apk
Resource
android-33-x64-arm64-20231215-en
Behavioral task
behavioral10
Sample
huiziyuan.net.url
Resource
win7-20231129-en
Behavioral task
behavioral11
Sample
huiziyuan.net.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral12
Sample
全自动安装.exe
Resource
win7-20231215-en
Behavioral task
behavioral13
Sample
全自动安装.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
手动安装说明.txt
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
手动安装说明.txt
Resource
win10v2004-20231215-en
General
-
Target
全自动安装.exe
-
Size
72KB
-
MD5
e3a56ba7e5a9da5a9644e4b541737821
-
SHA1
e952e90438855ef0608f99ad4b91d1323e7b0008
-
SHA256
df2bb321578bd2a30fa4e6e6aec4f3da278fd8c7f9858da5f49fd8cb8a4f5e31
-
SHA512
63a6e042c77a053cec7b92df8f6fd602c826ceedb88798b84e80eb10a72661b0fb3996fdc3a5559e741fba889de7968b4ee765cb0e0cf9f3eaa5408b6e990611
-
SSDEEP
1536:LrPJVKjbcknWSOYvTfkWkFM79yQVEzET5Xy27YzlL2WRFc:LLJMjbcHDdMwQ4s7YxLjR
Malware Config
Signatures
-
resource yara_rule behavioral12/memory/2184-0-0x0000000140000000-0x000000014002F000-memory.dmp upx behavioral12/memory/2184-6-0x0000000140000000-0x000000014002F000-memory.dmp upx -
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
pid Process 2064 adb.exe 2808 adb.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2156 2184 全自动安装.exe 29 PID 2184 wrote to memory of 2156 2184 全自动安装.exe 29 PID 2184 wrote to memory of 2156 2184 全自动安装.exe 29 PID 2156 wrote to memory of 2064 2156 cmd.exe 30 PID 2156 wrote to memory of 2064 2156 cmd.exe 30 PID 2156 wrote to memory of 2064 2156 cmd.exe 30 PID 2156 wrote to memory of 2064 2156 cmd.exe 30 PID 2064 wrote to memory of 2148 2064 adb.exe 31 PID 2064 wrote to memory of 2148 2064 adb.exe 31 PID 2064 wrote to memory of 2148 2064 adb.exe 31 PID 2064 wrote to memory of 2148 2064 adb.exe 31 PID 2156 wrote to memory of 2808 2156 cmd.exe 32 PID 2156 wrote to memory of 2808 2156 cmd.exe 32 PID 2156 wrote to memory of 2808 2156 cmd.exe 32 PID 2156 wrote to memory of 2808 2156 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\3543.tmp\3544.tmp\3555.bat C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\adb\adb.exe"adb\adb.exe" install "com.anagan.qgp.apk"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\adb\adb.exeadb -L tcp:5037 fork-server server --reply-fd 2404⤵PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\adb\adb.exe"adb\adb.exe" kill-server3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2808
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435B
MD52f68a3064dcbc3c25ed677cf9f8b3729
SHA19fad2e5c9752ec30cd32f2f7c23cb5a52566766a
SHA2560a423e84702d81e85c2a8313fc0ea261ccb61ce1f255c1955f72505b76646163
SHA5123782942518bb897455c5435892b732af8ef487cbe5799f0e3c20e28d76d4f619d51c09f2f17a1be3a7a509344f5050d82dd2aa7a64d961a8281f7843fa1c615b