Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07/09/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
Resource
win10v2004-20240802-en
General
-
Target
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
-
Size
5.3MB
-
MD5
fbd9ad001bb2719f574c0705c5de05fb
-
SHA1
d07e77a490ad677935ac8213b88237e94440e791
-
SHA256
f0031f9d7f25d4d29581879f62565a5a565995899adc60213f9e218147c78593
-
SHA512
5724e3f858ae7ea92ba4ce325f3f8f4b90ecc6d7c19476e2888c4b09f0913463191b977f71314300918cceb0a6ae0b80e29d3c70891e8aeb9314da233a929e96
-
SSDEEP
98304:oeZOuRuvqAgef1ndGaX6tJJQv2FKA75OpVclc02vDRZTEB:1ZOPNdo3u0jc02vVZoB
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: nemu-downloader.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Netease\MuMuPlayerGlobal-12.0\1.txt nemu-downloader.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe -
Executes dropped EXE 6 IoCs
pid Process 2516 nemu-downloader.exe 3152 ColaBoxChecker.exe 4744 HyperVChecker.exe 1724 HyperVChecker.exe 3588 HyperVChecker.exe 2184 MuMuDownloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nemu-downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ColaBoxChecker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuMuDownloader.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 nemu-downloader.exe 2516 nemu-downloader.exe 2516 nemu-downloader.exe 2516 nemu-downloader.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2516 nemu-downloader.exe 2516 nemu-downloader.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 632 Process not Found 632 Process not Found 632 Process not Found 632 Process not Found -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2680 taskmgr.exe Token: SeSystemProfilePrivilege 2680 taskmgr.exe Token: SeCreateGlobalPrivilege 2680 taskmgr.exe Token: SeDebugPrivilege 2736 taskmgr.exe Token: SeSystemProfilePrivilege 2736 taskmgr.exe Token: SeCreateGlobalPrivilege 2736 taskmgr.exe Token: 33 2680 taskmgr.exe Token: SeIncBasePriorityPrivilege 2680 taskmgr.exe Token: SeDebugPrivilege 1588 taskmgr.exe Token: SeSystemProfilePrivilege 1588 taskmgr.exe Token: SeCreateGlobalPrivilege 1588 taskmgr.exe Token: 33 2736 taskmgr.exe Token: SeIncBasePriorityPrivilege 2736 taskmgr.exe Token: 33 1588 taskmgr.exe Token: SeIncBasePriorityPrivilege 1588 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2516 nemu-downloader.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe 2680 taskmgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2516 4212 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 73 PID 4212 wrote to memory of 2516 4212 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 73 PID 4212 wrote to memory of 2516 4212 MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe 73 PID 2516 wrote to memory of 3152 2516 nemu-downloader.exe 74 PID 2516 wrote to memory of 3152 2516 nemu-downloader.exe 74 PID 2516 wrote to memory of 3152 2516 nemu-downloader.exe 74 PID 2516 wrote to memory of 4744 2516 nemu-downloader.exe 78 PID 2516 wrote to memory of 4744 2516 nemu-downloader.exe 78 PID 2516 wrote to memory of 1724 2516 nemu-downloader.exe 80 PID 2516 wrote to memory of 1724 2516 nemu-downloader.exe 80 PID 2516 wrote to memory of 3588 2516 nemu-downloader.exe 82 PID 2516 wrote to memory of 3588 2516 nemu-downloader.exe 82 PID 2516 wrote to memory of 2184 2516 nemu-downloader.exe 87 PID 2516 wrote to memory of 2184 2516 nemu-downloader.exe 87 PID 2516 wrote to memory of 2184 2516 nemu-downloader.exe 87 PID 2680 wrote to memory of 2736 2680 taskmgr.exe 89 PID 2680 wrote to memory of 2736 2680 taskmgr.exe 89 PID 2736 wrote to memory of 1588 2736 taskmgr.exe 90 PID 2736 wrote to memory of 1588 2736 taskmgr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe"C:\Users\Admin\AppData\Local\Temp\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\7z7101B074\nemu-downloader.exeC:\Users\Admin\AppData\Local\Temp\7z7101B074\nemu-downloader.exe2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\7z7101B074\ColaBoxChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z7101B074\ColaBoxChecker.exe" checker /baseboard3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\7z7101B074\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z7101B074\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\7z7101B074\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z7101B074\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\7z7101B074\HyperVChecker.exe"C:\Users\Admin\AppData\Local\Temp\7z7101B074\HyperVChecker.exe"3⤵
- Executes dropped EXE
PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\7z7101B074\MuMuDownloader.exe"C:\Users\Admin\AppData\Local\Temp\7z7101B074\MuMuDownloader.exe" --log="C:\Users\Admin\AppData\Local\Temp\nemu-downloader-aria.log" --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=49850 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=prealloc --enable-mmap=true --connect-timeout=5 --rpc-max-request-size=1024M --stop-with-process=25163⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /13⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD530ec43ce86e297c1ee42df6209f5b18f
SHA1fe0a5ea6566502081cb23b2f0e91a3ab166aeed6
SHA2568ccddf0c77743a42067782bc7782321330406a752f58fb15fb1cd446e1ef0ee4
SHA51219e5a7197a92eeef0482142cfe0fb46f16ddfb5bf6d64e372e7258fa6d01cf9a1fac9f7258fd2fd73c0f8a064b8d79b51a1ec6d29bbb9b04cdbd926352388bae
-
Filesize
2KB
MD5b8da5aac926bbaec818b15f56bb5d7f6
SHA12b5bf97cd59e82c7ea96c31cf9998fbbf4884dc5
SHA2565be5216ae1d0aed64986299528f4d4fe629067d5f4097b8e4b9d1c6bcf4f3086
SHA512c39a28d58fb03f4f491bf9122a86a5cbe7677ec2856cf588f6263fa1f84f9ffc1e21b9bcaa60d290356f9018fb84375db532c8b678cf95cc0a2cc6ed8da89436
-
Filesize
4.0MB
MD5839708e3f96cf055436fa08d6205263c
SHA1a4579f8cb6b80fe3fd50099794f63eb51be3292f
SHA2561373c5d006a5dbcd9b86cfff9a37616f1245d1333c4adcefc7cd18926b98d752
SHA512ece67e031e06a0442d935e7d81d0eed57ae92b348b5d104423577478ce226e4a4bde834c54e31d33bfe6f574fb7798ba96886d9e8edb738edee6e7c9c43054cd
-
Filesize
117KB
MD5dbd84c6083e4badf4741d95ba3c9b5f8
SHA14a555adf8e0459bfd1145d9bd8d91b3fff94aad0
SHA2569ff467bc5a1c377102d25da9fa9c24dcc4375f456510f71584f0714fdfb2af39
SHA512fb5fe74f64254609e07d6642acf904562bb905cd7c14c6f85ba31bcdbaf06686c0586609ec4f5d2f8f55ff90334dcbb774a3a6e78df74bf1b1d0cd03dec21870
-
Filesize
5.7MB
MD52f3d77b4f587f956e9987598b0a218eb
SHA1c067432f3282438b367a10f6b0bc0466319e34e9
SHA2562f980c56d81f42ba47dc871a04406976dc490ded522131ce9a2e35c40ca8616e
SHA512a63afc6d708e3b974f147a2d27d90689d8743acd53d60ad0f81a3ab54dfa851d73bcb869d1e476035abc5e234479812730285c0826a2c3da62f39715e315f221
-
Filesize
114B
MD539f7539d0b83fe0edc35516bdcdae84e
SHA190ab6efd430f589460819811011c48d96dda3c67
SHA2568d837939187a95fec14fb07efde0d721fd5e20ea7d3c6076adb6d7978bc98626
SHA512d7e35fca4bf5d123b77b81a509910902a1c52bdc7d3c5fa0080aa61f9d61da360b7d317dd2a5dfcc3f15c1ddf21dbad40fb235e30a73296c39458d4ad191c0c8
-
Filesize
346B
MD5d00fb4c61a255b58ff09886c6c72461b
SHA14e4f7d7ae36f67a4d6fc8479f8400b3eb769e978
SHA25677dec4d79e1e844a2156f101defc0fc81c138a989e8ba1c722c58feb91b3cd4a
SHA5128494ab9fe0594f3ff7b0893ca3e25d6d0a706e546e92c5b662aa864affcefe5f9721a6a95f37f40cdacf39d27a23e2b3cd5dbca4d7b8909cd7c186209d4b46db
-
Filesize
3.2MB
MD5cdf8047ceae80d9cd9eb798a57bf6084
SHA18e7971401fada3099aed61849745fda37e1c0d32
SHA2561f01a9abac64fae72e0a253ad9ffe2d62cd2967c1c2bc90fb956ac446fe2b11e
SHA512ac366f38f39b935110192d1355147392ced5a21966cc22386804356dce24b2da7971a6a60d675689f93d74014d961bfb3b0c13cf06809b9f9feef580045e20dc
-
Filesize
509KB
MD5ecb43530caf9566c1b76d5af8d2097f1
SHA134562ada66cd1501fcb7411a1e1d86729fd7fdc0
SHA256a12381f97aee2d91568f44b23e866ccc99f0ae5e5961f318ed24b72f4f5da80a
SHA5124a243c0bc4dbaf892bee91ea7eff9e6a7732d3aa2df5bebd9a4bea2859a30a8511945ce3bb823f7ef921f2e1a98906fb676fce85f25fd5908646b3a2f5d02563
-
Filesize
215B
MD533e3e48e004e10061f4b7e6524eadbf6
SHA1f782256f95496db1e93808c3bb1f261ce9af5a74
SHA256130fe7530b30cf1a68579a007213493fb1d7aea78f7738372f223ff161b6f64c
SHA512b0e027f9bf764239a4058b30d6f64c16e617df3d356bf2f7d16f5efc4bd89d9a38ad34f14976d675b32087fe365c8e4613dfc19e34dcfd1e4db881e67e672795