Overview
overview
9Static
static
8080540b15c...f5.exe
windows7_x64
8080540b15c...f5.exe
windows10_x64
816937c50e9...9a.exe
windows7_x64
916937c50e9...9a.exe
windows10_x64
92fc4602468...5b.exe
windows7_x64
82fc4602468...5b.exe
windows10_x64
32fd826bdb8...14.exe
windows7_x64
82fd826bdb8...14.exe
windows10_x64
8cool summer.exe
windows7_x64
3cool summer.exe
windows10_x64
3iext3.fne.dll
windows7_x64
1iext3.fne.dll
windows10_x64
1krnln.fnr.dll
windows7_x64
1krnln.fnr.dll
windows10_x64
1xplib.fne.dll
windows7_x64
1xplib.fne.dll
windows10_x64
14373d18b2b...83.exe
windows7_x64
84373d18b2b...83.exe
windows10_x64
8485e37b429...f9.exe
windows7_x64
1485e37b429...f9.exe
windows10_x64
159c049de6d...14.exe
windows7_x64
859c049de6d...14.exe
windows10_x64
8641da56f29...fc.exe
windows7_x64
9641da56f29...fc.exe
windows10_x64
964b4fe7baf...60.exe
windows7_x64
164b4fe7baf...60.exe
windows10_x64
174368a064e...e0.exe
windows7_x64
874368a064e...e0.exe
windows10_x64
8c087a84574...ce.exe
windows7_x64
7c087a84574...ce.exe
windows10_x64
390eca63d6a...52.exe
windows7_x64
890eca63d6a...52.exe
windows10_x64
3Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-03-2021 23:08
Behavioral task
behavioral1
Sample
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
16937c50e9597e6d3ce66dc15632eee53ad10c32bb077d53baf0c4368b8a359a.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
16937c50e9597e6d3ce66dc15632eee53ad10c32bb077d53baf0c4368b8a359a.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
2fc4602468f243f742b496683ee9bd6ff22c4c85b56567eff3df2bf7ef5c495b.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
2fc4602468f243f742b496683ee9bd6ff22c4c85b56567eff3df2bf7ef5c495b.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
2fd826bdb83c394de8e5c660cb4af4885e071c96db236e80503b3c4ef048b414.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
2fd826bdb83c394de8e5c660cb4af4885e071c96db236e80503b3c4ef048b414.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
cool summer.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
cool summer.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
iext3.fne.dll
Resource
win7v20201028
Behavioral task
behavioral12
Sample
iext3.fne.dll
Resource
win10v20201028
Behavioral task
behavioral13
Sample
krnln.fnr.dll
Resource
win7v20201028
Behavioral task
behavioral14
Sample
krnln.fnr.dll
Resource
win10v20201028
Behavioral task
behavioral15
Sample
xplib.fne.dll
Resource
win7v20201028
Behavioral task
behavioral16
Sample
xplib.fne.dll
Resource
win10v20201028
Behavioral task
behavioral17
Sample
4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
485e37b429bee1807d1cc52afa3de654928bd2a17f71b028abe71b1abac7e3f9.exe
Resource
win7v20201028
Behavioral task
behavioral20
Sample
485e37b429bee1807d1cc52afa3de654928bd2a17f71b028abe71b1abac7e3f9.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
641da56f29c645a544f19c88f54c1dfcf3a7f52711c5b0ff8826cf36bbaef3fc.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
641da56f29c645a544f19c88f54c1dfcf3a7f52711c5b0ff8826cf36bbaef3fc.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
64b4fe7baf53d40ac6ab1fd13bdcedb48f38b37c76d792b93da00bc3ba195260.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
64b4fe7baf53d40ac6ab1fd13bdcedb48f38b37c76d792b93da00bc3ba195260.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
Resource
win7v20201028
Behavioral task
behavioral28
Sample
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
Resource
win10v20201028
Behavioral task
behavioral29
Sample
c087a84574092eba9510c17f425853ce.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
c087a84574092eba9510c17f425853ce.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
90eca63d6ac05c375af58247435cea9fa724335f946e4576986a25a553dcb852.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
90eca63d6ac05c375af58247435cea9fa724335f946e4576986a25a553dcb852.exe
Resource
win10v20201028
General
-
Target
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
-
Size
951KB
-
MD5
9fb6c6868de1100fc5b93f867a774587
-
SHA1
80974a833e924742924c267c2b3c5067fd863dbb
-
SHA256
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314
-
SHA512
4078beb194448b2951cc2b4b9ea374b0d2bd267d096c40954b8b76fbc4ddd66392614789f33e561492d2d1440fba631e887fab495addc5583b0b1dc4c2cd3c43
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 684 budha.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\budha.exe upx C:\Users\Admin\AppData\Local\Temp\budha.exe upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exedescription pid process target process PID 4700 wrote to memory of 684 4700 59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe budha.exe PID 4700 wrote to memory of 684 4700 59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe budha.exe PID 4700 wrote to memory of 684 4700 59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe"C:\Users\Admin\AppData\Local\Temp\59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\budha.exeMD5
38ac2134f2fa73331db4c1e741913444
SHA19ddaed11fd4623a054e4e94c6d004f3b8831c3ad
SHA2565c3754cabe2fd705dc89714c0902900960c4becd80648d4287418c0399995da9
SHA51292762d6f2b57e354ec8925cc9aca00ddc9672a2a5334c157455d4d14a87a496a9a6bbbe47014b9acabd25adf0ac50305487c050522eaf9db41b96d1b759e3478
-
C:\Users\Admin\AppData\Local\Temp\budha.exeMD5
38ac2134f2fa73331db4c1e741913444
SHA19ddaed11fd4623a054e4e94c6d004f3b8831c3ad
SHA2565c3754cabe2fd705dc89714c0902900960c4becd80648d4287418c0399995da9
SHA51292762d6f2b57e354ec8925cc9aca00ddc9672a2a5334c157455d4d14a87a496a9a6bbbe47014b9acabd25adf0ac50305487c050522eaf9db41b96d1b759e3478
-
memory/684-4-0x0000000000000000-mapping.dmp
-
memory/684-7-0x0000000002280000-0x0000000002281000-memory.dmpFilesize
4KB
-
memory/684-8-0x00000000025D0000-0x00000000029D0000-memory.dmpFilesize
4.0MB
-
memory/4700-2-0x0000000002120000-0x0000000002121000-memory.dmpFilesize
4KB
-
memory/4700-3-0x0000000002620000-0x0000000002A20000-memory.dmpFilesize
4.0MB