Analysis

  • max time kernel
    93s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 01:44

General

  • Target

    70890bda7b1a3b52a1bc1741b5a184e1.exe

  • Size

    50KB

  • MD5

    70890bda7b1a3b52a1bc1741b5a184e1

  • SHA1

    ec1d83fbd9593b0c4653c36767b2c9c7c7fcbf1f

  • SHA256

    50c79090bcb2d4fdc4342cf50d1efd5ccb7ec1500fa4d613012bbd7f2c18024c

  • SHA512

    994ead5548f7e4d92577166d2b5a2f9ee76474d8ab482881f2abad8044790d820e8b336722f1e16611b90f9cb0430fda0a16539a4f7b27906255ffa1fa808055

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAICW:aq7tdgI2MyzNORQtOflIwoHNV2XBFV76

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70890bda7b1a3b52a1bc1741b5a184e1.exe
    "C:\Users\Admin\AppData\Local\Temp\70890bda7b1a3b52a1bc1741b5a184e1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    50KB

    MD5

    a0c7b9f4ff99108857e8017175d45d3d

    SHA1

    615e866afd14a210c666938cbc4a7f78912f35e8

    SHA256

    e99ee78c53b86c3bda0a9b0fd36b50e0065682781fd15bbd8e8cf4348f62a6a9

    SHA512

    2ab9a16b08eab1d73a7d82688c40651075a5f363fc448fd1395c611ca112ac3f6016ce0851080f47e3a7978c16d1bb04346762530b901f4600cf01c29cd01fd1

  • memory/2976-0-0x0000000002280000-0x0000000002286000-memory.dmp

    Filesize

    24KB

  • memory/2976-1-0x0000000002280000-0x0000000002286000-memory.dmp

    Filesize

    24KB

  • memory/2976-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4948-21-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB