Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
33f88e738a3...0N.exe
windows7-x64
73f88e738a3...0N.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$_2_/MiniQQDL.exe
windows7-x64
7$_2_/MiniQQDL.exe
windows10-2004-x64
7$_2_/Tenio...xy.dll
windows7-x64
1$_2_/Tenio...xy.dll
windows10-2004-x64
1$_2_/Tenio...DL.dll
windows7-x64
1$_2_/Tenio...DL.dll
windows10-2004-x64
1$_2_/Tenio...DL.exe
windows7-x64
7$_2_/Tenio...DL.exe
windows10-2004-x64
7$_2_/Tenio...80.dll
windows7-x64
1$_2_/Tenio...80.dll
windows10-2004-x64
1$_2_/Tenio...rt.exe
windows7-x64
1$_2_/Tenio...rt.exe
windows10-2004-x64
1$_2_/Tenio...80.dll
windows7-x64
1$_2_/Tenio...80.dll
windows10-2004-x64
1$_2_/Tenio...80.dll
windows7-x64
1$_2_/Tenio...80.dll
windows10-2004-x64
1$_2_/Tenio...pi.dll
windows7-x64
1$_2_/Tenio...pi.dll
windows10-2004-x64
1$_2_/Tenio...pp.dll
windows7-x64
1$_2_/Tenio...pp.dll
windows10-2004-x64
1$_2_/Tenio...re.dll
windows7-x64
3$_2_/Tenio...re.dll
windows10-2004-x64
3$_2_/Tenio...ta.dll
windows7-x64
3$_2_/Tenio...ta.dll
windows10-2004-x64
3$_2_/Tenio...tp.dll
windows7-x64
3$_2_/Tenio...tp.dll
windows10-2004-x64
3$_2_/atl80.dll
windows7-x64
1$_2_/atl80.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
3f88e738a3ed1ad2aaab07b474da5910N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f88e738a3ed1ad2aaab07b474da5910N.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$_2_/MiniQQDL.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$_2_/MiniQQDL.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$_2_/TenioDL/TNProxy.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$_2_/TenioDL/TNProxy.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$_2_/TenioDL/TenioDL.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$_2_/TenioDL/TenioDL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$_2_/TenioDL/TenioDL.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$_2_/TenioDL/TenioDL.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$_2_/TenioDL/atl80.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$_2_/TenioDL/atl80.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$_2_/TenioDL/bugreport.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$_2_/TenioDL/bugreport.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
$_2_/TenioDL/msvcp80.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$_2_/TenioDL/msvcp80.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$_2_/TenioDL/msvcr80.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$_2_/TenioDL/msvcr80.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$_2_/TenioDL/p2papi.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$_2_/TenioDL/p2papi.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$_2_/TenioDL/p2papp.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$_2_/TenioDL/p2papp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$_2_/TenioDL/p2pcore.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$_2_/TenioDL/p2pcore.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$_2_/TenioDL/p2pdata.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
$_2_/TenioDL/p2pdata.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$_2_/TenioDL/p2phttp.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$_2_/TenioDL/p2phttp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$_2_/atl80.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$_2_/atl80.dll
Resource
win10v2004-20240709-en
General
-
Target
3f88e738a3ed1ad2aaab07b474da5910N.exe
-
Size
1.4MB
-
MD5
3f88e738a3ed1ad2aaab07b474da5910
-
SHA1
76c34461c171634f56ffb1335fead35d9f5878f2
-
SHA256
e06e7863d70d633589135d5f8801a19b09280d6bfb34cb3dec65d74ebebf6633
-
SHA512
bf5ba94b2f4253323f8484c899914c56847276cdd332ea0e46fc8cc08666337182a8ccc181b0528a865657cfc3414bfffabbfec795da48c5a4c9e01c4c54afd5
-
SSDEEP
24576:pmJJvwT8n4ZytMAgrvqGM0Vv0EnTd242/qZTIFHUe30/UeqxjYdnwAyRTnFlGl8n:pcAJZyNMz0YyqZ0FHXpRDGkDk8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2872 MiniQQDL.exe 2592 TenioDL.exe -
Loads dropped DLL 17 IoCs
pid Process 2280 3f88e738a3ed1ad2aaab07b474da5910N.exe 2280 3f88e738a3ed1ad2aaab07b474da5910N.exe 2280 3f88e738a3ed1ad2aaab07b474da5910N.exe 2872 MiniQQDL.exe 2872 MiniQQDL.exe 2872 MiniQQDL.exe 2872 MiniQQDL.exe 2872 MiniQQDL.exe 2592 TenioDL.exe 2592 TenioDL.exe 2592 TenioDL.exe 2592 TenioDL.exe 2592 TenioDL.exe 2592 TenioDL.exe 2592 TenioDL.exe 2592 TenioDL.exe 2592 TenioDL.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 844 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid TenioDL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd TenioDL.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid\SequenceID = 502508752bf925499ece93d5454febf1 TenioDL.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2872 MiniQQDL.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2872 MiniQQDL.exe 2872 MiniQQDL.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2872 MiniQQDL.exe 2872 MiniQQDL.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2872 MiniQQDL.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2872 2280 3f88e738a3ed1ad2aaab07b474da5910N.exe 31 PID 2280 wrote to memory of 2872 2280 3f88e738a3ed1ad2aaab07b474da5910N.exe 31 PID 2280 wrote to memory of 2872 2280 3f88e738a3ed1ad2aaab07b474da5910N.exe 31 PID 2280 wrote to memory of 2872 2280 3f88e738a3ed1ad2aaab07b474da5910N.exe 31 PID 2872 wrote to memory of 2592 2872 MiniQQDL.exe 32 PID 2872 wrote to memory of 2592 2872 MiniQQDL.exe 32 PID 2872 wrote to memory of 2592 2872 MiniQQDL.exe 32 PID 2872 wrote to memory of 2592 2872 MiniQQDL.exe 32 PID 2592 wrote to memory of 844 2592 TenioDL.exe 33 PID 2592 wrote to memory of 844 2592 TenioDL.exe 33 PID 2592 wrote to memory of 844 2592 TenioDL.exe 33 PID 2592 wrote to memory of 844 2592 TenioDL.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f88e738a3ed1ad2aaab07b474da5910N.exe"C:\Users\Admin\AppData\Local\Temp\3f88e738a3ed1ad2aaab07b474da5910N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\QQGameDownloader\dnf1300957820\MiniQQDL.exe"C:\Users\Admin\AppData\Local\Temp\QQGameDownloader\dnf1300957820\MiniQQDL.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\QQGameDownloader\dnf1300957820\TenioDL\TenioDL.exeC:\Users\Admin\AppData\Local\Temp\QQGameDownloader\dnf1300957820\TenioDL\TenioDL.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\AppData\Roaming\Tencent\Config\ /t /setintegritylevel low4⤵
- Modifies file permissions
PID:844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5a162db275914a5c7adcebf845af9fd07
SHA192b24aa4047876c0b7109ad5b0b595de3369fdc2
SHA256923f5a90bc36564cb8f8b4107e3f0a46b797d9fa737e8533c8b9acc183c78162
SHA512e4190800e07cb71b812e3e74d0a83a13fd5b3c5d764cb4c6deb49100a7040f48c55d518809c9d4ae20564b7ba2419a02c0ab716d3ac540e141f6ef440a267da2
-
Filesize
333KB
MD5ce472064b917fdd429b07d10880c487f
SHA10c092116d67a5447f1f632c4e0e65a3b516a892c
SHA256bdf2209a2cb6a7b9c3a0be4a7a0abdf988f446a4232973c6204ee2e4a2ed632a
SHA5122b158fc4498e3756c17c8b44d2fc2464d62c639b6d425e72301c0f9b6f359a67e011d647c8de698c9e794cef0e65cb9efda34b63ed060611d97b0eadbf3c88d7
-
Filesize
437KB
MD55120752765a11e1a4d71e6c9d6f2a720
SHA118cdb039a788e64be485d8c242a9eb2761e87826
SHA256f23545448f055dee379dee42ed95c9b7b6d7d8a1558814ec44544c0eda2f3797
SHA512fd53007a369f3fd49b2ae6fdfeacb78253bcbae1015dd6770232be3e8c9f3634928129084bead359cf6befb6473d371e798de0a8d09b19f2697e5a83ee3b6af4
-
Filesize
169KB
MD51fe9e12c790cba0013e96c7f7b805366
SHA1296aff428041ee5718dd2cefea89144077063b1c
SHA25669c24cca97afaf85d8b77ea1b8c4b56a3dae255973aeafd00c588c438f5c0fb6
SHA5124f63aa0041cb0de5dc96efeff1eeec6ab0f7d1418f8af0d78a12c3ef3892257211a860008ba17abd435c08cef542d1c93650522f7673406dc1d1f84b613d9251
-
Filesize
445KB
MD50b85695db97bc8fd031032d92a087292
SHA17b3a60eb255292b565912d7661cc1d7cc9dedc20
SHA256e4df17519d39d292d36e785786198e84d1f0b9b6ce868ce374bb28c82507b397
SHA5121ff3af7e2d0d62a5ed94104b9c59529103a59619fc623206f20be56fb916f33b30f81e8a1ec306b7d920440343f5f5827f8d9de56a61765fb2b4f0b52a5c89f5
-
Filesize
293KB
MD50a8116b1e43842e3c80283f92995d40b
SHA1ea38ce4eb1e6f80ff3e94afa87ac8ae7e5133018
SHA2565a6d5c77bd731243ae23161bf9717fd93a505d944a32233595e55a16507d82a8
SHA512294dd800fb7e2c7e9721369cb02293fdd4da33a7ce4cb97801a70f80f229a195400a0c143d3ca4b815f7e990a755c0fc85998a82c81913857d843ec6dc3a2fcf
-
Filesize
153KB
MD514d39f3db649d39bea3e14db860e6d9f
SHA120f134b305dee5415263f9b9a8963e4759740146
SHA256397f93340bc59f3c00f7054c58ec63b8b0b4512b0a5c4c8b658699357fbc6296
SHA51269a6028bf7e74e4c1d4916593b7ff1c3173ea98e0d9ce52087f9bc276c8fddb1e8c8c245a2a6aa0c7e44ba5e7112483f8419407b5a45b5e33ba52490a3dcd436
-
Filesize
647B
MD594e85d001b55f08ed0e89aee2e636e82
SHA1c9fbf8794cc01cf9c1f9a33ed92b6751164ea75e
SHA2566864609c02395d61e208144f09d6e1325f9edd6184687ad6487e401096d7df99
SHA5123ab36e1109f941e4bbf3c51bd24539182fb02e8ddbf545f3f63f50b834b5e6c36973b3d6457869a45c717111e588c40d07a65e420a597c4eada4f05eeb466529
-
Filesize
6KB
MD5e35560a715fd55c83d246cb3556c3c49
SHA1a48176ce8689963be39cfa6eee51256ff58cc0cd
SHA25674b11cb2c1c7d8ca3baef8f629a375c7af8e94cc16fd77ef11d7422b8a9904ef
SHA512952993cc0b9a11b26a39c4d92cca43d4a7c20b13e7bf139bf03afc00e7c7dccd6f618468911a8300f339448e883ad26db89b3cf52744c2f9b83f83d11dbeb06b
-
Filesize
4KB
MD5ac0f5bb78a550ac7e446c3544492d118
SHA1f652929b9010025f091ca9a0869089a18f9bbcc4
SHA25634db1440511c77de95edbcaf04334ecd2a2352a5e9e4569fdac409a7d2674ea3
SHA512ddc6e1771a2c748691f18aca31a1f62f3bb4e9993af03836a3cde19f794fa691a98c169f8f9dd8c3dfa6b9fca78560bba79f59d6ade2d82a9a642fd4ec37dfde
-
Filesize
3KB
MD588923333c0ef4fdbc840003cf6626aee
SHA1b86ed0c442e2e4d01d8920f9249fdc51aa15286d
SHA256919bf7c5a8737725c1b16dc6db58cedd61a0f0f7fefecea5ac5c8b75b5e43597
SHA512de632f170c0bfef70e60665dfd47beedbc9e60785e804284194e7b430992b8a79e45be9bbeef4fcbced61a8481f9489e65bcc3f024267eb5b2e5fde876d8ea1b
-
Filesize
13KB
MD5e86244f39e2c6b789e21778d621d796a
SHA133ff76380f8b3f625d048eefba4a05f9d828076d
SHA25688c4ceab88a931b23de388c75b4cf0a211ef6bdd9a95b76935af085a0c0a7ed8
SHA5124c56299c7a4a5716330e7a0edacff63080d35874c66edbf9c10430f668365a4cd6352ebd08bad504332f0e1a9dc84cb7bcc16f58b8737b329dac214a04ab26fb
-
Filesize
100KB
MD595af720512b20102e57839a67d367f6a
SHA16c22a4da214c611f26790ed906c7f6d0099591e1
SHA2563f0ce42e7e1b0858dd7c6f098b2a59df62b80946627c461bba25066ea5cc795c
SHA5124f624b6827ce0f5dd66bf43352c9f408d97572cc8ed234e9abb43767e20ee84f96210df2ad61c3ce95650ecdaa3c51703f5f77b5429f54a9deab9b24d18dd8e4
-
Filesize
4KB
MD55573c48b37b1b63f4e9ebc37d3a80cf0
SHA1fc7d5c12256b6d82d13c52d09b0bc02d223212ef
SHA256fddb4c77720fe8cd73a8b5386a40ddbe133e2f8df39a2156fbd41e17c94e005f
SHA512e9850d2b356442e9f0e80848d3356d5e53a9ec061aef9e9781157dd81a6e0303436acbd40c6a443e8861234a3b42e356ab5c839648f7a16a29ae25cec342022c
-
Filesize
4KB
MD5388bd11a405549c1f6af20a51b30ce73
SHA14b3f36f1db9386b1b27f06c35a0e6f46b684e1e8
SHA256b9a22f72ed280d076f57b109acdc2911d6e4377eb8833f4e738ddfa5b6770aae
SHA5120a917009dedd461674e9833a6bbdc964071f9776aca52c68bb2d9c7bb07c7f45b931fbfb11b0b81bf053c57ac422375aa91b99a97a41b6eda2d8b0572650469f
-
Filesize
94B
MD554aff56972739b035418e89ac1a01b8b
SHA175ad9b6699278aaac1c867872d431649f68d7b38
SHA256d0d8cf4f1a24548c15ce97284e0561e08488df97d01535d8eb25cadc9f7855f4
SHA51211b123f3f214cb9b58531f5ec568b5aadce81750e8f4a643d15c140a31a4b1dcc795915514e0275c153d385e61ff4ed4861d9433756d2faf96149035db8d5adb
-
Filesize
201KB
MD53063dcc85aaf2789dc05d64349b04f60
SHA1df0f098bb8d8f8fdc7794632a5f0746413cad50e
SHA256ff00cb35393d600040be9c3bd363890e13188a257114c07dfe1f6f06e5f0d6f1
SHA5127b9f56d348f420275a3788cf86fcb8ed5451a2c4b0961c51fa2144ad995c4ad66512ab34888065c8b1ac1b1c959183b86c0772e3c97507454a7a24beef2c9f32
-
Filesize
63KB
MD5ca5fe462579bce3707666a8c656105df
SHA15dea6f63e173da570590608a8a4c6e9ac523a6df
SHA2566c4b8dd9e61c62cdb8e53e9cfb18aa1a980180fb9156371c47745e4292a9d2d8
SHA51283f1939441186a83b4adf1e0f38a3d3947b8c6aa51839eab1ae496e154eb2742b2b07be37e97bfea68e24fffd7b7740f503aec5f718b6a037889f11bddf955a8