Resubmissions

28-03-2024 15:06

240328-sgx9sshb9x 10

28-03-2024 14:55

240328-sar47sha3x 10

Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2024 14:55

General

  • Target

    215c37360388d16653ffc1740c639d486753a9db69a8ad4f3e1b172b1b712df4.exe

  • Size

    32KB

  • MD5

    9de48e7cfc2bc56631387e527f859efd

  • SHA1

    959b863e84103132f89a10a7fd6981771881f763

  • SHA256

    215c37360388d16653ffc1740c639d486753a9db69a8ad4f3e1b172b1b712df4

  • SHA512

    0f899f44536b651b97204dd876013796c6835d0562d04c479ba3b73032ab15edc8307f9f2d96057a673a5f12be16e85a084dc73e6c76b73f8646e8f354bea2f7

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpNEmK/4BM:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\215c37360388d16653ffc1740c639d486753a9db69a8ad4f3e1b172b1b712df4.exe
    "C:\Users\Admin\AppData\Local\Temp\215c37360388d16653ffc1740c639d486753a9db69a8ad4f3e1b172b1b712df4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    32KB

    MD5

    7aefacf13354c7ba4525a30125d097d1

    SHA1

    bd8ad9a994d786d1c749f3f2dfff392d3662038f

    SHA256

    b530b323999f9b3b6b6790a211324e1a4445a71208ce1dd2270d3516921cebde

    SHA512

    49156757b728a76180a44115745949fed0cedbf09431389833d2d67d0ccebd2c46c51ceca4fa9840497bde0adfa0c8c75821b4ad3eae4e9d07bfb56192c8357b

  • memory/2312-23-0x0000000002050000-0x0000000002056000-memory.dmp

    Filesize

    24KB

  • memory/3408-0-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/3408-1-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/3408-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB