Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 02:09

General

  • Target

    69edf3b60b0a2ccec55e592742a8b8c3.exe

  • Size

    65KB

  • MD5

    69edf3b60b0a2ccec55e592742a8b8c3

  • SHA1

    5e05742d90d26f6752abafee0dd8cdd30ac15411

  • SHA256

    dd089c88a4d193d17aba79a77fcfa9bf77e5ac59745167e67262f9485d9da770

  • SHA512

    96bc4183ab997dd0583e3ca463ddb60d2c6d1652bbd65e346080ab12d5027da60c272999c0ed6e37cdcbc228666bf9a6352fbae4a70539d1dc13e51147339e88

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293WM:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7D

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69edf3b60b0a2ccec55e592742a8b8c3.exe
    "C:\Users\Admin\AppData\Local\Temp\69edf3b60b0a2ccec55e592742a8b8c3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    66KB

    MD5

    b46e74afd77df89d79e394a28a32305c

    SHA1

    5a8bbb4eb4bac8a79c56a802a6fa6718289f3962

    SHA256

    238bf0f96e65bb58bb4564c2c0161c883039a0672d24fe1e0c70782569ca6c91

    SHA512

    cade5bd93ab0bb40cf0842b4c77675419ac1954ef3564988cb7411e1efd59e1da822d1e5173579e75dc5efd6c4986a3d0f5965465524ce6b82ba311b8b3376cc

  • memory/2260-23-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2424-7-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2424-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2424-0-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB