Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3SecuriteIn...44.exe
windows7-x64
7SecuriteIn...44.exe
windows10-2004-x64
7GameRender.exe
windows7-x64
1GameRender.exe
windows10-2004-x64
1MiniClient.exe
windows7-x64
1MiniClient.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7zlib1.dll
windows7-x64
3zlib1.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.PUA.RiskWare.Youxun.22766.22244.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.PUA.RiskWare.Youxun.22766.22244.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
GameRender.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
GameRender.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
MiniClient.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
MiniClient.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uninst.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
zlib1.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
zlib1.dll
Resource
win10v2004-20240426-en
General
-
Target
uninst.exe
-
Size
502KB
-
MD5
1a0d8ba35bc0f7f3e81dbd33738f1e6a
-
SHA1
3f0fcf39f70df52a00f4fc31473f046650dba410
-
SHA256
992a4624a43642d6cd22350aaf229957cb98d02f5bfc084011586611d4f8552c
-
SHA512
e802b007ea4018423dd4c412d6ed9895cb35b78477a3b8638bbad3a86b7116575ef1d2f054101bd07f191b34de9314d40730e91426f06191b67abb3fd7f89acc
-
SSDEEP
12288:ZoOiHJ6Lmb2+/GaBfnpkIDo3i9Yuq0MPeq0i7+ASRJ6B:ZoDk+ZZnpktYiXSR0B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2420 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 2396 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral7/files/0x0005000000019437-2.dat nsis_installer_1 behavioral7/files/0x0005000000019437-2.dat nsis_installer_2 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3036 MiniClient.exe 3036 MiniClient.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2420 2396 uninst.exe 28 PID 2396 wrote to memory of 2420 2396 uninst.exe 28 PID 2396 wrote to memory of 2420 2396 uninst.exe 28 PID 2396 wrote to memory of 2420 2396 uninst.exe 28 PID 2420 wrote to memory of 3036 2420 Un_A.exe 29 PID 2420 wrote to memory of 3036 2420 Un_A.exe 29 PID 2420 wrote to memory of 3036 2420 Un_A.exe 29 PID 2420 wrote to memory of 3036 2420 Un_A.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\MiniClient.exe"C:\Users\Admin\AppData\Local\Temp\MiniClient.exe" -xiezai3⤵
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
502KB
MD51a0d8ba35bc0f7f3e81dbd33738f1e6a
SHA13f0fcf39f70df52a00f4fc31473f046650dba410
SHA256992a4624a43642d6cd22350aaf229957cb98d02f5bfc084011586611d4f8552c
SHA512e802b007ea4018423dd4c412d6ed9895cb35b78477a3b8638bbad3a86b7116575ef1d2f054101bd07f191b34de9314d40730e91426f06191b67abb3fd7f89acc