Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
d19312ee85bd12exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
d19312ee85bd12exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
d19312ee85bd12exeexeexeex.exe
-
Size
42KB
-
MD5
d19312ee85bd1234950bac0c5ba1e894
-
SHA1
eda2ad1051c2f656411c47bee5727ef347fbb81e
-
SHA256
edb81fb6bc2cd5b8d32e0e8389d36e2e5acc9de7c97f898036731f06e7bad979
-
SHA512
abb42a90d13c496b9866122c26f084cafae853f8b6429c112be00124bcaa61a7bfc8ceca1f17002fa2badfccbe8ac2bdc00b8d07840e028d554fbbbdb94dfc19
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3KxG:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 736 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 d19312ee85bd12exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2232 d19312ee85bd12exeexeexeex.exe 736 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 736 2232 d19312ee85bd12exeexeexeex.exe 28 PID 2232 wrote to memory of 736 2232 d19312ee85bd12exeexeexeex.exe 28 PID 2232 wrote to memory of 736 2232 d19312ee85bd12exeexeexeex.exe 28 PID 2232 wrote to memory of 736 2232 d19312ee85bd12exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d19312ee85bd12exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\d19312ee85bd12exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD541d38f31bce6e04f6432f6c1178d5b57
SHA19b01ff342c14b85bc823f02a8e3555e0cd043fff
SHA25674325a720813e28270ee1c03aedf73c3cd0b23988ad2b2d9326777a25db2ad6e
SHA512c3d070e43db73662ef063c9aa3ed5bbdb8aa9c563821de342853707a16b96c7dc27af80647e6543e6292c2c80dd682f268c58a5edbba5233f50b657b3d6b0036
-
Filesize
42KB
MD541d38f31bce6e04f6432f6c1178d5b57
SHA19b01ff342c14b85bc823f02a8e3555e0cd043fff
SHA25674325a720813e28270ee1c03aedf73c3cd0b23988ad2b2d9326777a25db2ad6e
SHA512c3d070e43db73662ef063c9aa3ed5bbdb8aa9c563821de342853707a16b96c7dc27af80647e6543e6292c2c80dd682f268c58a5edbba5233f50b657b3d6b0036
-
Filesize
42KB
MD541d38f31bce6e04f6432f6c1178d5b57
SHA19b01ff342c14b85bc823f02a8e3555e0cd043fff
SHA25674325a720813e28270ee1c03aedf73c3cd0b23988ad2b2d9326777a25db2ad6e
SHA512c3d070e43db73662ef063c9aa3ed5bbdb8aa9c563821de342853707a16b96c7dc27af80647e6543e6292c2c80dd682f268c58a5edbba5233f50b657b3d6b0036