Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 01:44

General

  • Target

    401668f84a783701981d7305ed4886bc.exe

  • Size

    65KB

  • MD5

    401668f84a783701981d7305ed4886bc

  • SHA1

    35b426f6ef2765624a8a8f4ab96595199f2f61fc

  • SHA256

    d919283acdcf1ece92380e0c27d5a43c3b8f03e7261c98f9c05dd24c2a20eb29

  • SHA512

    20e11d3ce4d24b4d2914925f0c11e1ce1585d471bc4802bd1e479a1f491ec13cebeae2e9717aeca94869bdeacbb5f044236237ff44da94c084d93d92820fd98d

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLH:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7i

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\401668f84a783701981d7305ed4886bc.exe
    "C:\Users\Admin\AppData\Local\Temp\401668f84a783701981d7305ed4886bc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    65KB

    MD5

    c7b133540806e39f3e9d8893ad486723

    SHA1

    ee32798948f63228b254362b69baf7a2f84b3a86

    SHA256

    379048770d59b8eef46e57423d95621e81becdecac59b2393aa6019b995ad8c4

    SHA512

    470678e463ba8ececb5d42a2d5652985914a33c270b69622bf81959584c4b196d59696dcf0699382650c3963a597c6c657c1b5ca137b07dc3892f064f2727307

  • memory/2940-18-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2976-0-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2976-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2976-4-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB