Overview
overview
9Static
static
8080540b15c...f5.exe
windows7_x64
8080540b15c...f5.exe
windows10_x64
816937c50e9...9a.exe
windows7_x64
916937c50e9...9a.exe
windows10_x64
92fc4602468...5b.exe
windows7_x64
82fc4602468...5b.exe
windows10_x64
32fd826bdb8...14.exe
windows7_x64
82fd826bdb8...14.exe
windows10_x64
8cool summer.exe
windows7_x64
3cool summer.exe
windows10_x64
3iext3.fne.dll
windows7_x64
1iext3.fne.dll
windows10_x64
1krnln.fnr.dll
windows7_x64
1krnln.fnr.dll
windows10_x64
1xplib.fne.dll
windows7_x64
1xplib.fne.dll
windows10_x64
14373d18b2b...83.exe
windows7_x64
84373d18b2b...83.exe
windows10_x64
8485e37b429...f9.exe
windows7_x64
1485e37b429...f9.exe
windows10_x64
159c049de6d...14.exe
windows7_x64
859c049de6d...14.exe
windows10_x64
8641da56f29...fc.exe
windows7_x64
9641da56f29...fc.exe
windows10_x64
964b4fe7baf...60.exe
windows7_x64
164b4fe7baf...60.exe
windows10_x64
174368a064e...e0.exe
windows7_x64
874368a064e...e0.exe
windows10_x64
8c087a84574...ce.exe
windows7_x64
7c087a84574...ce.exe
windows10_x64
390eca63d6a...52.exe
windows7_x64
890eca63d6a...52.exe
windows10_x64
3Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-03-2021 23:08
Behavioral task
behavioral1
Sample
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
16937c50e9597e6d3ce66dc15632eee53ad10c32bb077d53baf0c4368b8a359a.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
16937c50e9597e6d3ce66dc15632eee53ad10c32bb077d53baf0c4368b8a359a.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
2fc4602468f243f742b496683ee9bd6ff22c4c85b56567eff3df2bf7ef5c495b.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
2fc4602468f243f742b496683ee9bd6ff22c4c85b56567eff3df2bf7ef5c495b.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
2fd826bdb83c394de8e5c660cb4af4885e071c96db236e80503b3c4ef048b414.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
2fd826bdb83c394de8e5c660cb4af4885e071c96db236e80503b3c4ef048b414.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
cool summer.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
cool summer.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
iext3.fne.dll
Resource
win7v20201028
Behavioral task
behavioral12
Sample
iext3.fne.dll
Resource
win10v20201028
Behavioral task
behavioral13
Sample
krnln.fnr.dll
Resource
win7v20201028
Behavioral task
behavioral14
Sample
krnln.fnr.dll
Resource
win10v20201028
Behavioral task
behavioral15
Sample
xplib.fne.dll
Resource
win7v20201028
Behavioral task
behavioral16
Sample
xplib.fne.dll
Resource
win10v20201028
Behavioral task
behavioral17
Sample
4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
485e37b429bee1807d1cc52afa3de654928bd2a17f71b028abe71b1abac7e3f9.exe
Resource
win7v20201028
Behavioral task
behavioral20
Sample
485e37b429bee1807d1cc52afa3de654928bd2a17f71b028abe71b1abac7e3f9.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
641da56f29c645a544f19c88f54c1dfcf3a7f52711c5b0ff8826cf36bbaef3fc.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
641da56f29c645a544f19c88f54c1dfcf3a7f52711c5b0ff8826cf36bbaef3fc.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
64b4fe7baf53d40ac6ab1fd13bdcedb48f38b37c76d792b93da00bc3ba195260.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
64b4fe7baf53d40ac6ab1fd13bdcedb48f38b37c76d792b93da00bc3ba195260.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
Resource
win7v20201028
Behavioral task
behavioral28
Sample
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
Resource
win10v20201028
Behavioral task
behavioral29
Sample
c087a84574092eba9510c17f425853ce.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
c087a84574092eba9510c17f425853ce.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
90eca63d6ac05c375af58247435cea9fa724335f946e4576986a25a553dcb852.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
90eca63d6ac05c375af58247435cea9fa724335f946e4576986a25a553dcb852.exe
Resource
win10v20201028
General
-
Target
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
-
Size
939KB
-
MD5
9a8a41462d8c437a1861304151333084
-
SHA1
4de7438431f5fd3e2545e5ab77ac02032b01e923
-
SHA256
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0
-
SHA512
1cdf4e800310359e490284d364228631333499a3019e5a84fbd6f3c63780f38899fcdfd77510892fc5d0f000d822b5b33f6e1eb5a25a85c255360422db341458
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 2424 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exedescription pid process target process PID 3884 wrote to memory of 2424 3884 74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe budha.exe PID 3884 wrote to memory of 2424 3884 74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe budha.exe PID 3884 wrote to memory of 2424 3884 74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe"C:\Users\Admin\AppData\Local\Temp\74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\budha.exeMD5
a48d9761381e1039a77a86b8aab21cb6
SHA16b50fb6ccc900e73fa5b6fecd994758231fdc2ba
SHA256bf29b64d73d72475e440e1516c702720ad56c2455a6fe6ae2bb7cd3e49744c2d
SHA5121913ee7aa742166a9c3ff917c4fb53f7a8a87776787f70e0347f9d304f1952d9a22755f5389eafbc0b92d449d6ec0431882e8e290e1351ecff394368a6d008b5
-
C:\Users\Admin\AppData\Local\Temp\budha.exeMD5
a48d9761381e1039a77a86b8aab21cb6
SHA16b50fb6ccc900e73fa5b6fecd994758231fdc2ba
SHA256bf29b64d73d72475e440e1516c702720ad56c2455a6fe6ae2bb7cd3e49744c2d
SHA5121913ee7aa742166a9c3ff917c4fb53f7a8a87776787f70e0347f9d304f1952d9a22755f5389eafbc0b92d449d6ec0431882e8e290e1351ecff394368a6d008b5
-
memory/2424-2-0x0000000000000000-mapping.dmp
-
memory/2424-8-0x0000000002510000-0x0000000002910000-memory.dmpFilesize
4.0MB
-
memory/2424-7-0x00000000021C0000-0x00000000021C1000-memory.dmpFilesize
4KB
-
memory/3884-5-0x0000000002210000-0x0000000002211000-memory.dmpFilesize
4KB
-
memory/3884-6-0x00000000025E0000-0x00000000029E0000-memory.dmpFilesize
4.0MB