Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
70890bda7b1a3b52a1bc1741b5a184e1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
70890bda7b1a3b52a1bc1741b5a184e1.exe
Resource
win10v2004-20240226-en
General
-
Target
70890bda7b1a3b52a1bc1741b5a184e1.exe
-
Size
50KB
-
MD5
70890bda7b1a3b52a1bc1741b5a184e1
-
SHA1
ec1d83fbd9593b0c4653c36767b2c9c7c7fcbf1f
-
SHA256
50c79090bcb2d4fdc4342cf50d1efd5ccb7ec1500fa4d613012bbd7f2c18024c
-
SHA512
994ead5548f7e4d92577166d2b5a2f9ee76474d8ab482881f2abad8044790d820e8b336722f1e16611b90f9cb0430fda0a16539a4f7b27906255ffa1fa808055
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAICW:aq7tdgI2MyzNORQtOflIwoHNV2XBFV76
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation hurok.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 70890bda7b1a3b52a1bc1741b5a184e1.exe -
Executes dropped EXE 1 IoCs
pid Process 4948 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2976 wrote to memory of 4948 2976 70890bda7b1a3b52a1bc1741b5a184e1.exe 87 PID 2976 wrote to memory of 4948 2976 70890bda7b1a3b52a1bc1741b5a184e1.exe 87 PID 2976 wrote to memory of 4948 2976 70890bda7b1a3b52a1bc1741b5a184e1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\70890bda7b1a3b52a1bc1741b5a184e1.exe"C:\Users\Admin\AppData\Local\Temp\70890bda7b1a3b52a1bc1741b5a184e1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5a0c7b9f4ff99108857e8017175d45d3d
SHA1615e866afd14a210c666938cbc4a7f78912f35e8
SHA256e99ee78c53b86c3bda0a9b0fd36b50e0065682781fd15bbd8e8cf4348f62a6a9
SHA5122ab9a16b08eab1d73a7d82688c40651075a5f363fc448fd1395c611ca112ac3f6016ce0851080f47e3a7978c16d1bb04346762530b901f4600cf01c29cd01fd1