Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
ce21ce29cee8b2dee26f0333b33b1683.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce21ce29cee8b2dee26f0333b33b1683.exe
Resource
win10v2004-20240508-en
General
-
Target
ce21ce29cee8b2dee26f0333b33b1683.exe
-
Size
64KB
-
MD5
ce21ce29cee8b2dee26f0333b33b1683
-
SHA1
b38fd50a958b28061a60e6e9cd06e013cfee544f
-
SHA256
4263f58f939174bc5c341482d68e3515d1af356414e72d71b43332e4e8d8e22e
-
SHA512
862f1d403a687d2fa1a6da3e250b4d0e3f4019ed9ed09bb2f5ec6b5d18f84f9791eca386f6e6529b8bbdcaf96f2da964e24e1942bc28308d169f8601ea5e71d1
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293W8:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 ce21ce29cee8b2dee26f0333b33b1683.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2012 ce21ce29cee8b2dee26f0333b33b1683.exe 2252 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2252 2012 ce21ce29cee8b2dee26f0333b33b1683.exe 28 PID 2012 wrote to memory of 2252 2012 ce21ce29cee8b2dee26f0333b33b1683.exe 28 PID 2012 wrote to memory of 2252 2012 ce21ce29cee8b2dee26f0333b33b1683.exe 28 PID 2012 wrote to memory of 2252 2012 ce21ce29cee8b2dee26f0333b33b1683.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce21ce29cee8b2dee26f0333b33b1683.exe"C:\Users\Admin\AppData\Local\Temp\ce21ce29cee8b2dee26f0333b33b1683.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD57ea731ee6cccdf94f6ceae9aab4e75b5
SHA1d704f9faff1aebc98d85c5d91fa283902b7e7e18
SHA256644ce1dd6df027966ee7adf06890ef865a0266097cca9485ce4d919d7bab595c
SHA512721354681769d682042b3594436df4433585890668250407b812ff3767b73086292dfc2b1e44a612cae94a57549ff65b833184f335c835c3c3e78c5a08a991e0