Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 19:39

General

  • Target

    2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe

  • Size

    26KB

  • MD5

    6618803a9a0f8fc3cae55964aa65bd90

  • SHA1

    014c9e39a0d2d9de3a4654a1bf7272022ec16521

  • SHA256

    2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2

  • SHA512

    a13020ef3c094a840c67eb1bfbc9b881a79b077369c7441de1da6b701585fbb102bb16cb6a72f851020e8a3fec71e80cec441e91d87e8637331af94b5d802261

  • SSDEEP

    384:OMK3FwyFBMdQDShHak1xlQwP2x111oh11zeh3mZ4VUeNcoA8Qu8Xqewq:5K37B89hHTcrh3mZ4VncoA7Mewq

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe
    "C:\Users\Admin\AppData\Local\Temp\2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    26KB

    MD5

    2576c04165255acf56065ccab17885e3

    SHA1

    7df094a42ded0bad30faad621ce0d454e9cb200d

    SHA256

    883eadcb6fabb53da55b97e63c50f94f1824f274d57bb95f7c9e17f97889cb73

    SHA512

    1bfc696f1cf78714245dd2330b10141e23687fc54978cb63aa733394352437914a020465a8a123a1978beb37d357efbd39996b3719b70a65e62640050b97159a

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    26KB

    MD5

    2576c04165255acf56065ccab17885e3

    SHA1

    7df094a42ded0bad30faad621ce0d454e9cb200d

    SHA256

    883eadcb6fabb53da55b97e63c50f94f1824f274d57bb95f7c9e17f97889cb73

    SHA512

    1bfc696f1cf78714245dd2330b10141e23687fc54978cb63aa733394352437914a020465a8a123a1978beb37d357efbd39996b3719b70a65e62640050b97159a

  • \Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    26KB

    MD5

    2576c04165255acf56065ccab17885e3

    SHA1

    7df094a42ded0bad30faad621ce0d454e9cb200d

    SHA256

    883eadcb6fabb53da55b97e63c50f94f1824f274d57bb95f7c9e17f97889cb73

    SHA512

    1bfc696f1cf78714245dd2330b10141e23687fc54978cb63aa733394352437914a020465a8a123a1978beb37d357efbd39996b3719b70a65e62640050b97159a

  • memory/900-62-0x00000000025F0000-0x00000000029F0000-memory.dmp

    Filesize

    4.0MB

  • memory/900-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1552-54-0x0000000075681000-0x0000000075683000-memory.dmp

    Filesize

    8KB

  • memory/1552-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1552-59-0x00000000025D0000-0x00000000029D0000-memory.dmp

    Filesize

    4.0MB