Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3SecuriteIn...44.exe
windows7-x64
7SecuriteIn...44.exe
windows10-2004-x64
7GameRender.exe
windows7-x64
1GameRender.exe
windows10-2004-x64
1MiniClient.exe
windows7-x64
1MiniClient.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7zlib1.dll
windows7-x64
3zlib1.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.PUA.RiskWare.Youxun.22766.22244.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.PUA.RiskWare.Youxun.22766.22244.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
GameRender.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
GameRender.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
MiniClient.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
MiniClient.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uninst.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
zlib1.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
zlib1.dll
Resource
win10v2004-20240426-en
General
-
Target
uninst.exe
-
Size
502KB
-
MD5
1a0d8ba35bc0f7f3e81dbd33738f1e6a
-
SHA1
3f0fcf39f70df52a00f4fc31473f046650dba410
-
SHA256
992a4624a43642d6cd22350aaf229957cb98d02f5bfc084011586611d4f8552c
-
SHA512
e802b007ea4018423dd4c412d6ed9895cb35b78477a3b8638bbad3a86b7116575ef1d2f054101bd07f191b34de9314d40730e91426f06191b67abb3fd7f89acc
-
SSDEEP
12288:ZoOiHJ6Lmb2+/GaBfnpkIDo3i9Yuq0MPeq0i7+ASRJ6B:ZoDk+ZZnpktYiXSR0B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2660 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral8/files/0x0007000000023412-4.dat nsis_installer_1 behavioral8/files/0x0007000000023412-4.dat nsis_installer_2 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 768 MiniClient.exe 768 MiniClient.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5092 wrote to memory of 2660 5092 uninst.exe 84 PID 5092 wrote to memory of 2660 5092 uninst.exe 84 PID 5092 wrote to memory of 2660 5092 uninst.exe 84 PID 2660 wrote to memory of 768 2660 Un_A.exe 85 PID 2660 wrote to memory of 768 2660 Un_A.exe 85 PID 2660 wrote to memory of 768 2660 Un_A.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\MiniClient.exe"C:\Users\Admin\AppData\Local\Temp\MiniClient.exe" -xiezai3⤵
- Suspicious use of SetWindowsHookEx
PID:768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
502KB
MD51a0d8ba35bc0f7f3e81dbd33738f1e6a
SHA13f0fcf39f70df52a00f4fc31473f046650dba410
SHA256992a4624a43642d6cd22350aaf229957cb98d02f5bfc084011586611d4f8552c
SHA512e802b007ea4018423dd4c412d6ed9895cb35b78477a3b8638bbad3a86b7116575ef1d2f054101bd07f191b34de9314d40730e91426f06191b67abb3fd7f89acc