Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/01/2024, 05:35
240112-gactqsgcf6 712/01/2024, 05:30
240112-f7lx8sfdbm 712/01/2024, 05:25
240112-f4aqssfcej 7Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/01/2024, 05:35
Behavioral task
behavioral1
Sample
adb/AdbWinApi.dll
Resource
win11-20231215-en
Behavioral task
behavioral2
Sample
adb/AdbWinUsbApi.dll
Resource
win11-20231215-en
Behavioral task
behavioral3
Sample
adb/adb.exe
Resource
win11-20231215-en
Behavioral task
behavioral4
Sample
com.anagan.qgp.apk
Resource
win11-20231215-en
Behavioral task
behavioral5
Sample
huiziyuan.net.url
Resource
win11-20231215-en
Behavioral task
behavioral6
Sample
全自动安装.exe
Resource
win11-20231215-en
General
-
Target
全自动安装.exe
-
Size
72KB
-
MD5
e3a56ba7e5a9da5a9644e4b541737821
-
SHA1
e952e90438855ef0608f99ad4b91d1323e7b0008
-
SHA256
df2bb321578bd2a30fa4e6e6aec4f3da278fd8c7f9858da5f49fd8cb8a4f5e31
-
SHA512
63a6e042c77a053cec7b92df8f6fd602c826ceedb88798b84e80eb10a72661b0fb3996fdc3a5559e741fba889de7968b4ee765cb0e0cf9f3eaa5408b6e990611
-
SSDEEP
1536:LrPJVKjbcknWSOYvTfkWkFM79yQVEzET5Xy27YzlL2WRFc:LLJMjbcHDdMwQ4s7YxLjR
Malware Config
Signatures
-
resource yara_rule behavioral6/memory/1788-0-0x0000000140000000-0x000000014002F000-memory.dmp upx behavioral6/memory/1788-6-0x0000000140000000-0x000000014002F000-memory.dmp upx -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4428 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1788 wrote to memory of 4508 1788 全自动安装.exe 81 PID 1788 wrote to memory of 4508 1788 全自动安装.exe 81 PID 4508 wrote to memory of 4760 4508 cmd.exe 82 PID 4508 wrote to memory of 4760 4508 cmd.exe 82 PID 4508 wrote to memory of 4760 4508 cmd.exe 82 PID 4760 wrote to memory of 1276 4760 adb.exe 84 PID 4760 wrote to memory of 1276 4760 adb.exe 84 PID 4760 wrote to memory of 1276 4760 adb.exe 84 PID 4508 wrote to memory of 2124 4508 cmd.exe 85 PID 4508 wrote to memory of 2124 4508 cmd.exe 85 PID 4508 wrote to memory of 2124 4508 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7678.tmp\7679.tmp\767A.bat C:\Users\Admin\AppData\Local\Temp\全自动安装.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\adb\adb.exe"adb\adb.exe" install "com.anagan.qgp.apk"3⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\adb\adb.exeadb -L tcp:5037 fork-server server --reply-fd 6084⤵PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\adb\adb.exe"adb\adb.exe" kill-server3⤵PID:2124
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6112
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7678.tmp\7679.tmp\767A.bat1⤵
- Opens file in notepad (likely ransom note)
PID:4428
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435B
MD52f68a3064dcbc3c25ed677cf9f8b3729
SHA19fad2e5c9752ec30cd32f2f7c23cb5a52566766a
SHA2560a423e84702d81e85c2a8313fc0ea261ccb61ce1f255c1955f72505b76646163
SHA5123782942518bb897455c5435892b732af8ef487cbe5799f0e3c20e28d76d4f619d51c09f2f17a1be3a7a509344f5050d82dd2aa7a64d961a8281f7843fa1c615b