Analysis

  • max time kernel
    153s
  • max time network
    167s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    06-09-2021 06:40

General

  • Target

    eb0d18828cbd76d92a2577259a0946a40bc93b251f782c00e8cb59236d5f7953.exe

  • Size

    941KB

  • MD5

    4764bfca9ee54dd8aa68ee903dfcc410

  • SHA1

    c4a3aaa80063f2a6024b7ccc2179ffe593544a47

  • SHA256

    eb0d18828cbd76d92a2577259a0946a40bc93b251f782c00e8cb59236d5f7953

  • SHA512

    33852223eab7f5ff0d8759301e11a58765772a16e15b566b20f8892f718cf0ca059b0fbecb2e6a77e7003cc4180836afa9d7b924783053ae4912e2b3a9d44a75

Score
10/10

Malware Config

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb0d18828cbd76d92a2577259a0946a40bc93b251f782c00e8cb59236d5f7953.exe
    "C:\Users\Admin\AppData\Local\Temp\eb0d18828cbd76d92a2577259a0946a40bc93b251f782c00e8cb59236d5f7953.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:2868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    MD5

    51cd7ad1b9282ca12a0dc37d830e852e

    SHA1

    8284acec29a8238b5bb83e2a474219ce980c823b

    SHA256

    231e7fba1f92a0870bf46100e7e9637c786d34b36fe06fc073db69ca5d03ee0f

    SHA512

    0d32e4b233b34825f55a12b58de5dd552fa13b416e12c49d375e1cad0d7d48823c58836be4f4f3aadb3cfb605f2d5fb14281a99cbef3ccea88ec089e31d71993

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    MD5

    51cd7ad1b9282ca12a0dc37d830e852e

    SHA1

    8284acec29a8238b5bb83e2a474219ce980c823b

    SHA256

    231e7fba1f92a0870bf46100e7e9637c786d34b36fe06fc073db69ca5d03ee0f

    SHA512

    0d32e4b233b34825f55a12b58de5dd552fa13b416e12c49d375e1cad0d7d48823c58836be4f4f3aadb3cfb605f2d5fb14281a99cbef3ccea88ec089e31d71993

  • memory/2868-117-0x0000000000000000-mapping.dmp

  • memory/2868-120-0x0000000002160000-0x0000000002161000-memory.dmp

    Filesize

    4KB

  • memory/2868-121-0x00000000025B0000-0x00000000029B0000-memory.dmp

    Filesize

    4.0MB

  • memory/4596-115-0x0000000002380000-0x0000000002381000-memory.dmp

    Filesize

    4KB

  • memory/4596-116-0x00000000026D0000-0x0000000002AD0000-memory.dmp

    Filesize

    4.0MB