Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 13:13
Static task
static1
Behavioral task
behavioral1
Sample
2d4ae32e9e17a1exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2d4ae32e9e17a1exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
2d4ae32e9e17a1exeexeexeex.exe
-
Size
55KB
-
MD5
2d4ae32e9e17a1e4aadfe0b93ed93959
-
SHA1
06b1c90ee8eae5f9b661ab0f23646a93eee93b49
-
SHA256
6062cf0d703bd2c06f95a22e2c557df29ab41d45d438ce57ffbae4f1c6273612
-
SHA512
3ef071a76d8fbca240fa05dd0dfef455f652b72077d176f6f852464daa3c4d7bba25630e548426e44a2b3cbe933c14087b65908e87f3c40c8596eb9999e0cebb
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzp0ojjf:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7e
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation 2d4ae32e9e17a1exeexeexeex.exe Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 3796 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 3796 4856 2d4ae32e9e17a1exeexeexeex.exe 84 PID 4856 wrote to memory of 3796 4856 2d4ae32e9e17a1exeexeexeex.exe 84 PID 4856 wrote to memory of 3796 4856 2d4ae32e9e17a1exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d4ae32e9e17a1exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\2d4ae32e9e17a1exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD59eeeb142d443e13cd2355c0b808c2566
SHA111f7e6ad720fcca46fbc49ea819af64e150595f1
SHA256678d2ed6f6e737fea67ad1c61e76f5d2aa42deca54e26dffb14da8a078ab8a49
SHA512a226a9c7b47d34a9e1765d331f5bf965b5b51b642643da9aa1e33ab63c8918920befe493696c4cf3ad62cb9c0d4f61b46697e52eb151bd3af3ecbd4e46d5ba87
-
Filesize
55KB
MD59eeeb142d443e13cd2355c0b808c2566
SHA111f7e6ad720fcca46fbc49ea819af64e150595f1
SHA256678d2ed6f6e737fea67ad1c61e76f5d2aa42deca54e26dffb14da8a078ab8a49
SHA512a226a9c7b47d34a9e1765d331f5bf965b5b51b642643da9aa1e33ab63c8918920befe493696c4cf3ad62cb9c0d4f61b46697e52eb151bd3af3ecbd4e46d5ba87
-
Filesize
55KB
MD59eeeb142d443e13cd2355c0b808c2566
SHA111f7e6ad720fcca46fbc49ea819af64e150595f1
SHA256678d2ed6f6e737fea67ad1c61e76f5d2aa42deca54e26dffb14da8a078ab8a49
SHA512a226a9c7b47d34a9e1765d331f5bf965b5b51b642643da9aa1e33ab63c8918920befe493696c4cf3ad62cb9c0d4f61b46697e52eb151bd3af3ecbd4e46d5ba87