Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-05-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe
Resource
win10v20210410
General
-
Target
3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe
-
Size
788KB
-
MD5
979256bdf52ce26f4e8b78454d30cc50
-
SHA1
f6ce44400c6a054720d31d76c6e1c3fa9229ab4e
-
SHA256
3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a
-
SHA512
8b50913c10d5640ec0fc34d12b2d41a5642f8f7688d38ece002887d7aa25db003aaa757a48f3a913255288e8ba09dc744f722487333fb36a022fab5a7b1cfb78
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 1452 budha.exe -
Loads dropped DLL 1 IoCs
Processes:
3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exepid process 1028 3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exedescription pid process target process PID 1028 wrote to memory of 1452 1028 3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe budha.exe PID 1028 wrote to memory of 1452 1028 3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe budha.exe PID 1028 wrote to memory of 1452 1028 3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe budha.exe PID 1028 wrote to memory of 1452 1028 3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe"C:\Users\Admin\AppData\Local\Temp\3619125da756223b183b82a359379f16e57ff066ddf6d1727de9ff28ce4e1a1a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:1452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c1ef8aac265041aa2e1105fb12d580e3
SHA10e5bc702bd6527d9d55cdb90064f37b51abc1139
SHA25672cabe8c8ecc6b414e058fc14748d8a11347a9826c75ea6355c8001b637a82f9
SHA5120360af968b07f7f3b1458487ff12dcc895801f3050097967a1ef092ad018b0f6c741291690ec00733fead2c62ab0f42dfab81f1d6829e8daa31d4d30f5bd3d5f
-
MD5
c1ef8aac265041aa2e1105fb12d580e3
SHA10e5bc702bd6527d9d55cdb90064f37b51abc1139
SHA25672cabe8c8ecc6b414e058fc14748d8a11347a9826c75ea6355c8001b637a82f9
SHA5120360af968b07f7f3b1458487ff12dcc895801f3050097967a1ef092ad018b0f6c741291690ec00733fead2c62ab0f42dfab81f1d6829e8daa31d4d30f5bd3d5f
-
MD5
c1ef8aac265041aa2e1105fb12d580e3
SHA10e5bc702bd6527d9d55cdb90064f37b51abc1139
SHA25672cabe8c8ecc6b414e058fc14748d8a11347a9826c75ea6355c8001b637a82f9
SHA5120360af968b07f7f3b1458487ff12dcc895801f3050097967a1ef092ad018b0f6c741291690ec00733fead2c62ab0f42dfab81f1d6829e8daa31d4d30f5bd3d5f