Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
b732e7fa4517110ffcde8c7265b50d1c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b732e7fa4517110ffcde8c7265b50d1c.exe
Resource
win10v2004-20240426-en
General
-
Target
b732e7fa4517110ffcde8c7265b50d1c.exe
-
Size
38KB
-
MD5
b732e7fa4517110ffcde8c7265b50d1c
-
SHA1
5e45a8b27cfddfa7fae3a04ff24412da7cf58ca2
-
SHA256
c30ca90c6bccc49ad2b528983b1ad649be8ab1925087cdebea1bbe9a5b5d866d
-
SHA512
c8c53aec6ce1b804b6fd0d0dea666de429a9fbbd850510ccf5fa015d02370fddf3c6edfcb5b2a8f1056e1a6bd0721c324a39510cb595c88e72557de80a0692c5
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGp/YIm7wm0WZym:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2540 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2700 b732e7fa4517110ffcde8c7265b50d1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2700 b732e7fa4517110ffcde8c7265b50d1c.exe 2540 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2540 2700 b732e7fa4517110ffcde8c7265b50d1c.exe 28 PID 2700 wrote to memory of 2540 2700 b732e7fa4517110ffcde8c7265b50d1c.exe 28 PID 2700 wrote to memory of 2540 2700 b732e7fa4517110ffcde8c7265b50d1c.exe 28 PID 2700 wrote to memory of 2540 2700 b732e7fa4517110ffcde8c7265b50d1c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b732e7fa4517110ffcde8c7265b50d1c.exe"C:\Users\Admin\AppData\Local\Temp\b732e7fa4517110ffcde8c7265b50d1c.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD525b1a1249967e5dc3f2de1d40e024422
SHA1f4e6d47b03f0356ec7c4e6bde7a1489bd052deaa
SHA256920c89e1dc448b995d1a44f67e2705dc6a607e0e7f925be29f6d4edd10d0904c
SHA512a103a56cf9e673bd22cd464f562792b5051effa116299ade023f6a230f7b82a5455d9943a56408253e59939c93e43e015af65b9de1d29793f332cf7aeeb98490