Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
b2a6df014fe06aexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
b2a6df014fe06aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
b2a6df014fe06aexeexeexeex.exe
-
Size
64KB
-
MD5
b2a6df014fe06af18f5a5bce6243206c
-
SHA1
f056963beb271258e2baff79ced8cd2e82960066
-
SHA256
43cdf3115af291203532ee5b830f5dbf1d7dec693de559a7491827f538efd555
-
SHA512
575313e5b07ba4a0fbca6191d2fd344930fa5863f548807bafe2c40bbf94c831c2fb88b84e52cbd522223f63a583e43c26576e333d361fc633bf176fdcf48535
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xo3/nyxEK:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2328 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2388 b2a6df014fe06aexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2388 b2a6df014fe06aexeexeexeex.exe 2328 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2328 2388 b2a6df014fe06aexeexeexeex.exe 29 PID 2388 wrote to memory of 2328 2388 b2a6df014fe06aexeexeexeex.exe 29 PID 2388 wrote to memory of 2328 2388 b2a6df014fe06aexeexeexeex.exe 29 PID 2388 wrote to memory of 2328 2388 b2a6df014fe06aexeexeexeex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2a6df014fe06aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\b2a6df014fe06aexeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5a352bd8e5bb096c41bff9fe05fc9e477
SHA18e01a2cee5f6d39ce30f2ac007313cba8f052fce
SHA2565571b7e746f11e33e3b8bc0e3365d7d797c04ab39a4dca8875c630263e82f96c
SHA5123ddc7a3610255bddd7dd6f05e8385735fa4ea3ffbe8728ece3148fec689f6327b4c2b1f9f1b930655f09d63dfb03f38f1fd248b9e46e26a7717909231f04011b
-
Filesize
64KB
MD5a352bd8e5bb096c41bff9fe05fc9e477
SHA18e01a2cee5f6d39ce30f2ac007313cba8f052fce
SHA2565571b7e746f11e33e3b8bc0e3365d7d797c04ab39a4dca8875c630263e82f96c
SHA5123ddc7a3610255bddd7dd6f05e8385735fa4ea3ffbe8728ece3148fec689f6327b4c2b1f9f1b930655f09d63dfb03f38f1fd248b9e46e26a7717909231f04011b
-
Filesize
64KB
MD5a352bd8e5bb096c41bff9fe05fc9e477
SHA18e01a2cee5f6d39ce30f2ac007313cba8f052fce
SHA2565571b7e746f11e33e3b8bc0e3365d7d797c04ab39a4dca8875c630263e82f96c
SHA5123ddc7a3610255bddd7dd6f05e8385735fa4ea3ffbe8728ece3148fec689f6327b4c2b1f9f1b930655f09d63dfb03f38f1fd248b9e46e26a7717909231f04011b