Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
1caf10a365519f652849092cea735b99.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1caf10a365519f652849092cea735b99.exe
Resource
win10v2004-20231215-en
General
-
Target
1caf10a365519f652849092cea735b99.exe
-
Size
62KB
-
MD5
1caf10a365519f652849092cea735b99
-
SHA1
3cf1780504438c91bb0e6be7739afc1cab0103bb
-
SHA256
37970affc03207fcc98390c0b1d3f9e99c748a422d2ad228625701bd1bb1c458
-
SHA512
725b5e73afd94526a21675138179f0bf9b37b71c6e50716ef9f61e0720e2a684d237739020b841048b31195607505cb679c508d391130f643cb004c5430f656b
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDSc9S:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7U
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 1caf10a365519f652849092cea735b99.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 1016 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 1016 3228 1caf10a365519f652849092cea735b99.exe 83 PID 3228 wrote to memory of 1016 3228 1caf10a365519f652849092cea735b99.exe 83 PID 3228 wrote to memory of 1016 3228 1caf10a365519f652849092cea735b99.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1caf10a365519f652849092cea735b99.exe"C:\Users\Admin\AppData\Local\Temp\1caf10a365519f652849092cea735b99.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5da7a9b2330e74197f45c53a3bc9b27b3
SHA1673a65af895f05f6ed0d41f824835bc268410bde
SHA2562be9d918351c9daa11967f30e27fb0fc5d39609ddf9f33351bf3b64d2d62e2b5
SHA5124ae1ee44cabb610d01e62261c015ff4035d75686d1e6b6df8320adcea7f9203b9e192510a5110a0be14cbdf6a241ccbac8f3ab681d8ce5d8f2c661df6694bda1