Analysis

  • max time kernel
    129s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 17:56

General

  • Target

    a05b6f3a25e996_JC.exe

  • Size

    64KB

  • MD5

    a05b6f3a25e99639cc1c46c2a37e5d86

  • SHA1

    3ebf4b4113b550407882dbf44359ad1205b5761e

  • SHA256

    c997a8478c1f7df8a477e1f5d19015676542154d423e09716d3c8bce1c8d01dc

  • SHA512

    ee7394b12996c1482c4cbd57f3a930992de2ee3ca07e1244167e9ac29b367833f5b1965f4f9b44de3ee1cee3f5ce82e17f6f82a1d1e7e38ea46ef4aafe7a619b

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xo3/nyxEJ:aq7tdgI2MyzNORQtOflIwoHNV2XBFV71

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a05b6f3a25e996_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a05b6f3a25e996_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    64KB

    MD5

    0cb036035d1851c4d37579a595912cb5

    SHA1

    bddb30243ad6742765bc178c8e94e8b35ac9b64a

    SHA256

    6c7b7757e804399befe1efa78e69b9a2dd72ab11e416640b9326a924507f6a2f

    SHA512

    a22d25784c5c75179f77fb02fb7f61db02838eede89537a20b884302624ec04b44ac5fa1dc52d1cd119a1ced6e2bd34d56256ae97278e07ec2290d08f1bfb412

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    64KB

    MD5

    0cb036035d1851c4d37579a595912cb5

    SHA1

    bddb30243ad6742765bc178c8e94e8b35ac9b64a

    SHA256

    6c7b7757e804399befe1efa78e69b9a2dd72ab11e416640b9326a924507f6a2f

    SHA512

    a22d25784c5c75179f77fb02fb7f61db02838eede89537a20b884302624ec04b44ac5fa1dc52d1cd119a1ced6e2bd34d56256ae97278e07ec2290d08f1bfb412

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    64KB

    MD5

    0cb036035d1851c4d37579a595912cb5

    SHA1

    bddb30243ad6742765bc178c8e94e8b35ac9b64a

    SHA256

    6c7b7757e804399befe1efa78e69b9a2dd72ab11e416640b9326a924507f6a2f

    SHA512

    a22d25784c5c75179f77fb02fb7f61db02838eede89537a20b884302624ec04b44ac5fa1dc52d1cd119a1ced6e2bd34d56256ae97278e07ec2290d08f1bfb412

  • memory/3352-153-0x0000000002040000-0x0000000002046000-memory.dmp

    Filesize

    24KB

  • memory/3800-133-0x0000000002180000-0x0000000002186000-memory.dmp

    Filesize

    24KB

  • memory/3800-134-0x0000000002180000-0x0000000002186000-memory.dmp

    Filesize

    24KB

  • memory/3800-135-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB