Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2023, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
4b598a5795bd98exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4b598a5795bd98exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4b598a5795bd98exeexe_JC.exe
-
Size
64KB
-
MD5
4b598a5795bd98ee99db1c755332dac0
-
SHA1
b33f90723c42892c510e39207089e447b34ae2c2
-
SHA256
6397ae0896dd3bcc078399ec2b8694723210d4c79762e21b8783317fe02ce484
-
SHA512
3e6dfaeff7706b29cd24ac5c098db7600303b9692c0c7327e4c8ebcb6ee33fcbeb839273238dde134cd63ac86f02db5753f866a6e6da5de35f4292115e597ccc
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniaKbER:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation 4b598a5795bd98exeexe_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 1472 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1472 1288 4b598a5795bd98exeexe_JC.exe 86 PID 1288 wrote to memory of 1472 1288 4b598a5795bd98exeexe_JC.exe 86 PID 1288 wrote to memory of 1472 1288 4b598a5795bd98exeexe_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b598a5795bd98exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\4b598a5795bd98exeexe_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54c9ff859396f4a8f33edbe07ac21f87b
SHA1e935bc1fd24a5d4ce084822696e51dfe3b6b9614
SHA256d17b7d3950278b35ea4f09e0cb74000e75737768ceed78190f3d5c432a6fb9f7
SHA512c7045def3b44aef130ae0446da08e6fd36c6ecad7425536de1f20e7b9cdb8830335467298425720edefd22db41d34a666342038d3cf2bafc28c4c5c3179c5367
-
Filesize
64KB
MD54c9ff859396f4a8f33edbe07ac21f87b
SHA1e935bc1fd24a5d4ce084822696e51dfe3b6b9614
SHA256d17b7d3950278b35ea4f09e0cb74000e75737768ceed78190f3d5c432a6fb9f7
SHA512c7045def3b44aef130ae0446da08e6fd36c6ecad7425536de1f20e7b9cdb8830335467298425720edefd22db41d34a666342038d3cf2bafc28c4c5c3179c5367
-
Filesize
64KB
MD54c9ff859396f4a8f33edbe07ac21f87b
SHA1e935bc1fd24a5d4ce084822696e51dfe3b6b9614
SHA256d17b7d3950278b35ea4f09e0cb74000e75737768ceed78190f3d5c432a6fb9f7
SHA512c7045def3b44aef130ae0446da08e6fd36c6ecad7425536de1f20e7b9cdb8830335467298425720edefd22db41d34a666342038d3cf2bafc28c4c5c3179c5367