Overview
overview
9Static
static
8080540b15c...f5.exe
windows7_x64
8080540b15c...f5.exe
windows10_x64
816937c50e9...9a.exe
windows7_x64
916937c50e9...9a.exe
windows10_x64
92fc4602468...5b.exe
windows7_x64
82fc4602468...5b.exe
windows10_x64
32fd826bdb8...14.exe
windows7_x64
82fd826bdb8...14.exe
windows10_x64
8cool summer.exe
windows7_x64
3cool summer.exe
windows10_x64
3iext3.fne.dll
windows7_x64
1iext3.fne.dll
windows10_x64
1krnln.fnr.dll
windows7_x64
1krnln.fnr.dll
windows10_x64
1xplib.fne.dll
windows7_x64
1xplib.fne.dll
windows10_x64
14373d18b2b...83.exe
windows7_x64
84373d18b2b...83.exe
windows10_x64
8485e37b429...f9.exe
windows7_x64
1485e37b429...f9.exe
windows10_x64
159c049de6d...14.exe
windows7_x64
859c049de6d...14.exe
windows10_x64
8641da56f29...fc.exe
windows7_x64
9641da56f29...fc.exe
windows10_x64
964b4fe7baf...60.exe
windows7_x64
164b4fe7baf...60.exe
windows10_x64
174368a064e...e0.exe
windows7_x64
874368a064e...e0.exe
windows10_x64
8c087a84574...ce.exe
windows7_x64
7c087a84574...ce.exe
windows10_x64
390eca63d6a...52.exe
windows7_x64
890eca63d6a...52.exe
windows10_x64
3Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-03-2021 23:08
Behavioral task
behavioral1
Sample
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
16937c50e9597e6d3ce66dc15632eee53ad10c32bb077d53baf0c4368b8a359a.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
16937c50e9597e6d3ce66dc15632eee53ad10c32bb077d53baf0c4368b8a359a.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
2fc4602468f243f742b496683ee9bd6ff22c4c85b56567eff3df2bf7ef5c495b.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
2fc4602468f243f742b496683ee9bd6ff22c4c85b56567eff3df2bf7ef5c495b.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
2fd826bdb83c394de8e5c660cb4af4885e071c96db236e80503b3c4ef048b414.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
2fd826bdb83c394de8e5c660cb4af4885e071c96db236e80503b3c4ef048b414.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
cool summer.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
cool summer.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
iext3.fne.dll
Resource
win7v20201028
Behavioral task
behavioral12
Sample
iext3.fne.dll
Resource
win10v20201028
Behavioral task
behavioral13
Sample
krnln.fnr.dll
Resource
win7v20201028
Behavioral task
behavioral14
Sample
krnln.fnr.dll
Resource
win10v20201028
Behavioral task
behavioral15
Sample
xplib.fne.dll
Resource
win7v20201028
Behavioral task
behavioral16
Sample
xplib.fne.dll
Resource
win10v20201028
Behavioral task
behavioral17
Sample
4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
485e37b429bee1807d1cc52afa3de654928bd2a17f71b028abe71b1abac7e3f9.exe
Resource
win7v20201028
Behavioral task
behavioral20
Sample
485e37b429bee1807d1cc52afa3de654928bd2a17f71b028abe71b1abac7e3f9.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
641da56f29c645a544f19c88f54c1dfcf3a7f52711c5b0ff8826cf36bbaef3fc.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
641da56f29c645a544f19c88f54c1dfcf3a7f52711c5b0ff8826cf36bbaef3fc.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
64b4fe7baf53d40ac6ab1fd13bdcedb48f38b37c76d792b93da00bc3ba195260.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
64b4fe7baf53d40ac6ab1fd13bdcedb48f38b37c76d792b93da00bc3ba195260.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
Resource
win7v20201028
Behavioral task
behavioral28
Sample
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
Resource
win10v20201028
Behavioral task
behavioral29
Sample
c087a84574092eba9510c17f425853ce.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
c087a84574092eba9510c17f425853ce.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
90eca63d6ac05c375af58247435cea9fa724335f946e4576986a25a553dcb852.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
90eca63d6ac05c375af58247435cea9fa724335f946e4576986a25a553dcb852.exe
Resource
win10v20201028
General
-
Target
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
-
Size
1005KB
-
MD5
9c7795073fe543136748180a9d22abec
-
SHA1
3b1ffb90e59e01d33444ca5516321cebd55a2e7c
-
SHA256
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5
-
SHA512
363dd2f8775b766fcf14f5aa629dbb36e169d45bf0091814ad3ed0f5d0a787a3eb35758eef3bfd55325eabcf7576f3bd009e7408d17b4569d1ea92d3db9a746f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 1264 budha.exe -
Loads dropped DLL 1 IoCs
Processes:
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exepid process 1616 080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exedescription pid process target process PID 1616 wrote to memory of 1264 1616 080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe budha.exe PID 1616 wrote to memory of 1264 1616 080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe budha.exe PID 1616 wrote to memory of 1264 1616 080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe budha.exe PID 1616 wrote to memory of 1264 1616 080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe"C:\Users\Admin\AppData\Local\Temp\080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\budha.exeMD5
2f3d2a9aa670513ffec1d13e24554649
SHA1e43ece602174a5ba250f0aca3ff6faf27450a19e
SHA2568a942e73acadc477d2aa5d419accd1cd2e933355abb2b972f1085da37e8ddba5
SHA5120e94a1202dbece5db1018b7fe81edbe692ffa7e2f171c05f6b5099b9a0706f94ea0b942184c9982216f2779a93e8fb5c1b290a0e632bac5118e83f411e2a5659
-
C:\Users\Admin\AppData\Local\Temp\budha.exeMD5
2f3d2a9aa670513ffec1d13e24554649
SHA1e43ece602174a5ba250f0aca3ff6faf27450a19e
SHA2568a942e73acadc477d2aa5d419accd1cd2e933355abb2b972f1085da37e8ddba5
SHA5120e94a1202dbece5db1018b7fe81edbe692ffa7e2f171c05f6b5099b9a0706f94ea0b942184c9982216f2779a93e8fb5c1b290a0e632bac5118e83f411e2a5659
-
\Users\Admin\AppData\Local\Temp\budha.exeMD5
2f3d2a9aa670513ffec1d13e24554649
SHA1e43ece602174a5ba250f0aca3ff6faf27450a19e
SHA2568a942e73acadc477d2aa5d419accd1cd2e933355abb2b972f1085da37e8ddba5
SHA5120e94a1202dbece5db1018b7fe81edbe692ffa7e2f171c05f6b5099b9a0706f94ea0b942184c9982216f2779a93e8fb5c1b290a0e632bac5118e83f411e2a5659
-
memory/860-12-0x000007FEF7BD0000-0x000007FEF7E4A000-memory.dmpFilesize
2.5MB
-
memory/1264-6-0x0000000000000000-mapping.dmp
-
memory/1264-10-0x0000000001ED0000-0x0000000001ED1000-memory.dmpFilesize
4KB
-
memory/1264-11-0x00000000027C0000-0x0000000002BC0000-memory.dmpFilesize
4.0MB
-
memory/1616-2-0x00000000765A1000-0x00000000765A3000-memory.dmpFilesize
8KB
-
memory/1616-3-0x0000000000510000-0x0000000000511000-memory.dmpFilesize
4KB
-
memory/1616-4-0x0000000002770000-0x0000000002B70000-memory.dmpFilesize
4.0MB