Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe
Resource
win10v2004-20240508-en
General
-
Target
d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe
-
Size
48KB
-
MD5
5ce7e90e2e3ab4f3f5c72846c584ac32
-
SHA1
56be2ad6b3b70e2d31c43f457d9092598a056b28
-
SHA256
d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f
-
SHA512
1377a4479ced8b239d7d877e1de6bf63f211fbfb7051e9587d28ac67ce31f0dc57e6860b6c589578b984c0ec0909d49b80944c854030ace31eb418c73bf05e31
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x5hjatshF:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2560 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2836 d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2836 d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe 2560 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2560 2836 d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe 28 PID 2836 wrote to memory of 2560 2836 d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe 28 PID 2836 wrote to memory of 2560 2836 d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe 28 PID 2836 wrote to memory of 2560 2836 d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe"C:\Users\Admin\AppData\Local\Temp\d26ec968215a37f2ad86ce0b017c14abf3c41ff39b170d64bf87ea2eb519242f.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5fba7fbd565026681ef6db432f30a521f
SHA1729b5640fe0a91106e04e2630f5b52585a72b266
SHA256e46f25697414517d9495532cef1898b24dbd63e8cb187c93b545fdf6cd9eb102
SHA512ca0648967022ad868f08214b5bdc3dd91e24b2d19b4b0e758f8cc3830c4b0c46eeeadedbacfbee910e4814394eb09753fe2dc3e8cfbcd472731a4a7cec4ae397