Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
69edf3b60b0a2ccec55e592742a8b8c3.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69edf3b60b0a2ccec55e592742a8b8c3.exe
Resource
win10v2004-20240508-en
General
-
Target
69edf3b60b0a2ccec55e592742a8b8c3.exe
-
Size
65KB
-
MD5
69edf3b60b0a2ccec55e592742a8b8c3
-
SHA1
5e05742d90d26f6752abafee0dd8cdd30ac15411
-
SHA256
dd089c88a4d193d17aba79a77fcfa9bf77e5ac59745167e67262f9485d9da770
-
SHA512
96bc4183ab997dd0583e3ca463ddb60d2c6d1652bbd65e346080ab12d5027da60c272999c0ed6e37cdcbc228666bf9a6352fbae4a70539d1dc13e51147339e88
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293WM:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2260 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 69edf3b60b0a2ccec55e592742a8b8c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2424 69edf3b60b0a2ccec55e592742a8b8c3.exe 2260 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2260 2424 69edf3b60b0a2ccec55e592742a8b8c3.exe 28 PID 2424 wrote to memory of 2260 2424 69edf3b60b0a2ccec55e592742a8b8c3.exe 28 PID 2424 wrote to memory of 2260 2424 69edf3b60b0a2ccec55e592742a8b8c3.exe 28 PID 2424 wrote to memory of 2260 2424 69edf3b60b0a2ccec55e592742a8b8c3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\69edf3b60b0a2ccec55e592742a8b8c3.exe"C:\Users\Admin\AppData\Local\Temp\69edf3b60b0a2ccec55e592742a8b8c3.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5b46e74afd77df89d79e394a28a32305c
SHA15a8bbb4eb4bac8a79c56a802a6fa6718289f3962
SHA256238bf0f96e65bb58bb4564c2c0161c883039a0672d24fe1e0c70782569ca6c91
SHA512cade5bd93ab0bb40cf0842b4c77675419ac1954ef3564988cb7411e1efd59e1da822d1e5173579e75dc5efd6c4986a3d0f5965465524ce6b82ba311b8b3376cc