Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2023, 10:31

General

  • Target

    65dbc9b1db6d69_JC.exe

  • Size

    54KB

  • MD5

    65dbc9b1db6d6920f3c07cec147bb3bb

  • SHA1

    3184cfcb4c9bca6414dc3737b977b38f38207498

  • SHA256

    5ee0dcc8a5792354c0d03220bb7d8ef57a98b18fbb9313127b94ff7d5d5a2121

  • SHA512

    60ee503f336837eb3210ebc6c487f302fc4205f253c98be05173df2f895c6b210bab637bd1ed4d24e48b8a4ee1763957f427a321d09022a98fcca11dff87b6f1

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzp0ojjl:aq7tdgI2MyzNORQtOflIwoHNV2XBFV74

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65dbc9b1db6d69_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\65dbc9b1db6d69_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2580

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          54KB

          MD5

          048926e3d7938fec935454e11fb2739e

          SHA1

          08a82ee76e15afb0f0e0a88733afce87cfc3b589

          SHA256

          af50b79445d35a01b18fc21ba971dbb62b07b5c7a2eb8ea0366660786f06b8ed

          SHA512

          e7199244c9692192191f97d7a7fa609d4cfc15a03c1f142b6b3894638fd7da8a27fd7c079b66193917fb282ae34b286e18437ff68c7f7ada8786e4eadd6cff8e

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          54KB

          MD5

          048926e3d7938fec935454e11fb2739e

          SHA1

          08a82ee76e15afb0f0e0a88733afce87cfc3b589

          SHA256

          af50b79445d35a01b18fc21ba971dbb62b07b5c7a2eb8ea0366660786f06b8ed

          SHA512

          e7199244c9692192191f97d7a7fa609d4cfc15a03c1f142b6b3894638fd7da8a27fd7c079b66193917fb282ae34b286e18437ff68c7f7ada8786e4eadd6cff8e

        • \Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          54KB

          MD5

          048926e3d7938fec935454e11fb2739e

          SHA1

          08a82ee76e15afb0f0e0a88733afce87cfc3b589

          SHA256

          af50b79445d35a01b18fc21ba971dbb62b07b5c7a2eb8ea0366660786f06b8ed

          SHA512

          e7199244c9692192191f97d7a7fa609d4cfc15a03c1f142b6b3894638fd7da8a27fd7c079b66193917fb282ae34b286e18437ff68c7f7ada8786e4eadd6cff8e

        • memory/2580-70-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2616-54-0x0000000000230000-0x0000000000236000-memory.dmp

          Filesize

          24KB

        • memory/2616-55-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2616-56-0x0000000000230000-0x0000000000236000-memory.dmp

          Filesize

          24KB