Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/07/2023, 20:22

General

  • Target

    e162730a170d0e_JC.exe

  • Size

    64KB

  • MD5

    e162730a170d0ed353f18b032d3fa50a

  • SHA1

    cf7d893def1ceeeb8d5b2f20fc69f539e32ca3e0

  • SHA256

    f575f8e4fdec9b9ad9e0368789274a7dbf661c584518a2dabf15aeb436efcaba

  • SHA512

    542f9c4f3e7dda3135cf7ddce24296ec2f3cddc4d620ac6fb02d228df0a2a3f7290e891d25b3cc069c9b5d54c03111ff166f4a62daf8ecb1b25856a89f866448

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniaKbER:aq7tdgI2MyzNORQtOflIwoHNV2XBFV76

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e162730a170d0e_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\e162730a170d0e_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4388

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          64KB

          MD5

          9d897dc36964e904748d7d960ac0a72a

          SHA1

          de1a576b2fbe8d8b7ccc4cbe8eea017cee8de6b9

          SHA256

          b1b8b6c2056acf45b9a2338782e7b4372abb77a0cb60fef2aeea07e0bd886ceb

          SHA512

          2cfcad2b50c7c0e077d96350b7220ec869cea176e76b900e6d36a7c440e29bb34731588fb366d7ae9137b1a8b2a1bf87cb7f4dfabb46858bad2fb6f88651a2fa

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          64KB

          MD5

          9d897dc36964e904748d7d960ac0a72a

          SHA1

          de1a576b2fbe8d8b7ccc4cbe8eea017cee8de6b9

          SHA256

          b1b8b6c2056acf45b9a2338782e7b4372abb77a0cb60fef2aeea07e0bd886ceb

          SHA512

          2cfcad2b50c7c0e077d96350b7220ec869cea176e76b900e6d36a7c440e29bb34731588fb366d7ae9137b1a8b2a1bf87cb7f4dfabb46858bad2fb6f88651a2fa

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          64KB

          MD5

          9d897dc36964e904748d7d960ac0a72a

          SHA1

          de1a576b2fbe8d8b7ccc4cbe8eea017cee8de6b9

          SHA256

          b1b8b6c2056acf45b9a2338782e7b4372abb77a0cb60fef2aeea07e0bd886ceb

          SHA512

          2cfcad2b50c7c0e077d96350b7220ec869cea176e76b900e6d36a7c440e29bb34731588fb366d7ae9137b1a8b2a1bf87cb7f4dfabb46858bad2fb6f88651a2fa

        • memory/4384-133-0x0000000000660000-0x0000000000666000-memory.dmp

          Filesize

          24KB

        • memory/4384-134-0x0000000000660000-0x0000000000666000-memory.dmp

          Filesize

          24KB

        • memory/4384-135-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/4388-150-0x0000000000570000-0x0000000000576000-memory.dmp

          Filesize

          24KB