Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
5d35e867803700exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
5d35e867803700exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
5d35e867803700exeexeexeex.exe
-
Size
55KB
-
MD5
5d35e8678037005eadf86862c4f58e3b
-
SHA1
0a015bda5bea42b19b085738418f0a2e653b0059
-
SHA256
7537d2d83df8cd26afb93fe916f31860c885047ba3ff952d170c0f00554a6f56
-
SHA512
8602f2d11ca32b11c09a83fa004085c3d0851ffece273e113398ffcdb72453cf0b48ccb56f518bab74c04f5cd31c3ff712798c919c17c92dc4b2da316b965c49
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzp0oj67a:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 468 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 3052 5d35e867803700exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3052 5d35e867803700exeexeexeex.exe 468 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 468 3052 5d35e867803700exeexeexeex.exe 27 PID 3052 wrote to memory of 468 3052 5d35e867803700exeexeexeex.exe 27 PID 3052 wrote to memory of 468 3052 5d35e867803700exeexeexeex.exe 27 PID 3052 wrote to memory of 468 3052 5d35e867803700exeexeexeex.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d35e867803700exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\5d35e867803700exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD525eaa9ee063b1516c787b74ae6987237
SHA119f159fca8271da8bc5948658ddd1d6700e32332
SHA256874b4784edb610b6d2d2008c7f3b040ca53c2b7ecfef34aa657845cf9c33ada5
SHA512be05796368f90d815fa5584b253e3dfb599e843ea99bcec6cd114733e87d585b37edc4d0fe0377886a30ac0c0c6e8660b9d7d24c79e08de5e7b71da35c3161d1
-
Filesize
56KB
MD525eaa9ee063b1516c787b74ae6987237
SHA119f159fca8271da8bc5948658ddd1d6700e32332
SHA256874b4784edb610b6d2d2008c7f3b040ca53c2b7ecfef34aa657845cf9c33ada5
SHA512be05796368f90d815fa5584b253e3dfb599e843ea99bcec6cd114733e87d585b37edc4d0fe0377886a30ac0c0c6e8660b9d7d24c79e08de5e7b71da35c3161d1
-
Filesize
56KB
MD525eaa9ee063b1516c787b74ae6987237
SHA119f159fca8271da8bc5948658ddd1d6700e32332
SHA256874b4784edb610b6d2d2008c7f3b040ca53c2b7ecfef34aa657845cf9c33ada5
SHA512be05796368f90d815fa5584b253e3dfb599e843ea99bcec6cd114733e87d585b37edc4d0fe0377886a30ac0c0c6e8660b9d7d24c79e08de5e7b71da35c3161d1