Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
401668f84a783701981d7305ed4886bc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
401668f84a783701981d7305ed4886bc.exe
Resource
win10v2004-20240226-en
General
-
Target
401668f84a783701981d7305ed4886bc.exe
-
Size
65KB
-
MD5
401668f84a783701981d7305ed4886bc
-
SHA1
35b426f6ef2765624a8a8f4ab96595199f2f61fc
-
SHA256
d919283acdcf1ece92380e0c27d5a43c3b8f03e7261c98f9c05dd24c2a20eb29
-
SHA512
20e11d3ce4d24b4d2914925f0c11e1ce1585d471bc4802bd1e479a1f491ec13cebeae2e9717aeca94869bdeacbb5f044236237ff44da94c084d93d92820fd98d
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLH:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2940 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 401668f84a783701981d7305ed4886bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2976 401668f84a783701981d7305ed4886bc.exe 2940 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2940 2976 401668f84a783701981d7305ed4886bc.exe 28 PID 2976 wrote to memory of 2940 2976 401668f84a783701981d7305ed4886bc.exe 28 PID 2976 wrote to memory of 2940 2976 401668f84a783701981d7305ed4886bc.exe 28 PID 2976 wrote to memory of 2940 2976 401668f84a783701981d7305ed4886bc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\401668f84a783701981d7305ed4886bc.exe"C:\Users\Admin\AppData\Local\Temp\401668f84a783701981d7305ed4886bc.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5c7b133540806e39f3e9d8893ad486723
SHA1ee32798948f63228b254362b69baf7a2f84b3a86
SHA256379048770d59b8eef46e57423d95621e81becdecac59b2393aa6019b995ad8c4
SHA512470678e463ba8ececb5d42a2d5652985914a33c270b69622bf81959584c4b196d59696dcf0699382650c3963a597c6c657c1b5ca137b07dc3892f064f2727307