Analysis

  • max time kernel
    148s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    06-09-2021 06:40

General

  • Target

    eb0d18828cbd76d92a2577259a0946a40bc93b251f782c00e8cb59236d5f7953.exe

  • Size

    941KB

  • MD5

    4764bfca9ee54dd8aa68ee903dfcc410

  • SHA1

    c4a3aaa80063f2a6024b7ccc2179ffe593544a47

  • SHA256

    eb0d18828cbd76d92a2577259a0946a40bc93b251f782c00e8cb59236d5f7953

  • SHA512

    33852223eab7f5ff0d8759301e11a58765772a16e15b566b20f8892f718cf0ca059b0fbecb2e6a77e7003cc4180836afa9d7b924783053ae4912e2b3a9d44a75

Score
10/10

Malware Config

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb0d18828cbd76d92a2577259a0946a40bc93b251f782c00e8cb59236d5f7953.exe
    "C:\Users\Admin\AppData\Local\Temp\eb0d18828cbd76d92a2577259a0946a40bc93b251f782c00e8cb59236d5f7953.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    MD5

    51cd7ad1b9282ca12a0dc37d830e852e

    SHA1

    8284acec29a8238b5bb83e2a474219ce980c823b

    SHA256

    231e7fba1f92a0870bf46100e7e9637c786d34b36fe06fc073db69ca5d03ee0f

    SHA512

    0d32e4b233b34825f55a12b58de5dd552fa13b416e12c49d375e1cad0d7d48823c58836be4f4f3aadb3cfb605f2d5fb14281a99cbef3ccea88ec089e31d71993

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    MD5

    51cd7ad1b9282ca12a0dc37d830e852e

    SHA1

    8284acec29a8238b5bb83e2a474219ce980c823b

    SHA256

    231e7fba1f92a0870bf46100e7e9637c786d34b36fe06fc073db69ca5d03ee0f

    SHA512

    0d32e4b233b34825f55a12b58de5dd552fa13b416e12c49d375e1cad0d7d48823c58836be4f4f3aadb3cfb605f2d5fb14281a99cbef3ccea88ec089e31d71993

  • \Users\Admin\AppData\Local\Temp\budha.exe

    MD5

    51cd7ad1b9282ca12a0dc37d830e852e

    SHA1

    8284acec29a8238b5bb83e2a474219ce980c823b

    SHA256

    231e7fba1f92a0870bf46100e7e9637c786d34b36fe06fc073db69ca5d03ee0f

    SHA512

    0d32e4b233b34825f55a12b58de5dd552fa13b416e12c49d375e1cad0d7d48823c58836be4f4f3aadb3cfb605f2d5fb14281a99cbef3ccea88ec089e31d71993

  • memory/980-59-0x00000000757C1000-0x00000000757C3000-memory.dmp

    Filesize

    8KB

  • memory/980-65-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/980-66-0x0000000002710000-0x0000000002B10000-memory.dmp

    Filesize

    4.0MB

  • memory/1648-61-0x0000000000000000-mapping.dmp

  • memory/1648-67-0x0000000001EF0000-0x0000000001EF1000-memory.dmp

    Filesize

    4KB

  • memory/1648-68-0x00000000028E0000-0x0000000002CE0000-memory.dmp

    Filesize

    4.0MB