Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/01/2024, 05:35
240112-gactqsgcf6 712/01/2024, 05:30
240112-f7lx8sfdbm 712/01/2024, 05:25
240112-f4aqssfcej 7Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
12/01/2024, 05:30
Behavioral task
behavioral1
Sample
Quest Games Optimizer 9.2.1 -NIF(1).zip
Resource
win10v2004-20231222-es
Behavioral task
behavioral2
Sample
adb/AdbWinApi.dll
Resource
win10v2004-20231215-es
Behavioral task
behavioral3
Sample
adb/AdbWinUsbApi.dll
Resource
win10v2004-20231222-es
Behavioral task
behavioral4
Sample
adb/adb.exe
Resource
win10v2004-20231215-es
Behavioral task
behavioral5
Sample
com.anagan.qgp.apk
Resource
win10v2004-20231215-es
Behavioral task
behavioral6
Sample
huiziyuan.net.url
Resource
win10v2004-20231215-es
Behavioral task
behavioral7
Sample
全自动安装.exe
Resource
win10v2004-20231215-es
General
-
Target
全自动安装.exe
-
Size
72KB
-
MD5
e3a56ba7e5a9da5a9644e4b541737821
-
SHA1
e952e90438855ef0608f99ad4b91d1323e7b0008
-
SHA256
df2bb321578bd2a30fa4e6e6aec4f3da278fd8c7f9858da5f49fd8cb8a4f5e31
-
SHA512
63a6e042c77a053cec7b92df8f6fd602c826ceedb88798b84e80eb10a72661b0fb3996fdc3a5559e741fba889de7968b4ee765cb0e0cf9f3eaa5408b6e990611
-
SSDEEP
1536:LrPJVKjbcknWSOYvTfkWkFM79yQVEzET5Xy27YzlL2WRFc:LLJMjbcHDdMwQ4s7YxLjR
Malware Config
Signatures
-
resource yara_rule behavioral7/memory/4800-0-0x0000000140000000-0x000000014002F000-memory.dmp upx behavioral7/memory/4800-6-0x0000000140000000-0x000000014002F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3076 4800 全自动安装.exe 89 PID 4800 wrote to memory of 3076 4800 全自动安装.exe 89 PID 3076 wrote to memory of 3980 3076 cmd.exe 91 PID 3076 wrote to memory of 3980 3076 cmd.exe 91 PID 3076 wrote to memory of 3980 3076 cmd.exe 91 PID 3980 wrote to memory of 2844 3980 adb.exe 96 PID 3980 wrote to memory of 2844 3980 adb.exe 96 PID 3980 wrote to memory of 2844 3980 adb.exe 96 PID 3076 wrote to memory of 2676 3076 cmd.exe 99 PID 3076 wrote to memory of 2676 3076 cmd.exe 99 PID 3076 wrote to memory of 2676 3076 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6EE6.tmp\6EE7.tmp\6EE8.bat C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\adb\adb.exe"adb\adb.exe" install "com.anagan.qgp.apk"3⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\adb\adb.exeadb -L tcp:5037 fork-server server --reply-fd 6004⤵PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\adb\adb.exe"adb\adb.exe" kill-server3⤵PID:2676
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435B
MD52f68a3064dcbc3c25ed677cf9f8b3729
SHA19fad2e5c9752ec30cd32f2f7c23cb5a52566766a
SHA2560a423e84702d81e85c2a8313fc0ea261ccb61ce1f255c1955f72505b76646163
SHA5123782942518bb897455c5435892b732af8ef487cbe5799f0e3c20e28d76d4f619d51c09f2f17a1be3a7a509344f5050d82dd2aa7a64d961a8281f7843fa1c615b