Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe
Resource
win10v2004-20220812-en
General
-
Target
2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe
-
Size
26KB
-
MD5
6618803a9a0f8fc3cae55964aa65bd90
-
SHA1
014c9e39a0d2d9de3a4654a1bf7272022ec16521
-
SHA256
2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2
-
SHA512
a13020ef3c094a840c67eb1bfbc9b881a79b077369c7441de1da6b701585fbb102bb16cb6a72f851020e8a3fec71e80cec441e91d87e8637331af94b5d802261
-
SSDEEP
384:OMK3FwyFBMdQDShHak1xlQwP2x111oh11zeh3mZ4VUeNcoA8Qu8Xqewq:5K37B89hHTcrh3mZ4VncoA7Mewq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 900 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 1552 2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1552 wrote to memory of 900 1552 2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe 26 PID 1552 wrote to memory of 900 1552 2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe 26 PID 1552 wrote to memory of 900 1552 2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe 26 PID 1552 wrote to memory of 900 1552 2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe"C:\Users\Admin\AppData\Local\Temp\2b858715b42eb5b9317a238c749a31dcc8e5abbc8625bfa0e5383693b69ca8b2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD52576c04165255acf56065ccab17885e3
SHA17df094a42ded0bad30faad621ce0d454e9cb200d
SHA256883eadcb6fabb53da55b97e63c50f94f1824f274d57bb95f7c9e17f97889cb73
SHA5121bfc696f1cf78714245dd2330b10141e23687fc54978cb63aa733394352437914a020465a8a123a1978beb37d357efbd39996b3719b70a65e62640050b97159a
-
Filesize
26KB
MD52576c04165255acf56065ccab17885e3
SHA17df094a42ded0bad30faad621ce0d454e9cb200d
SHA256883eadcb6fabb53da55b97e63c50f94f1824f274d57bb95f7c9e17f97889cb73
SHA5121bfc696f1cf78714245dd2330b10141e23687fc54978cb63aa733394352437914a020465a8a123a1978beb37d357efbd39996b3719b70a65e62640050b97159a
-
Filesize
26KB
MD52576c04165255acf56065ccab17885e3
SHA17df094a42ded0bad30faad621ce0d454e9cb200d
SHA256883eadcb6fabb53da55b97e63c50f94f1824f274d57bb95f7c9e17f97889cb73
SHA5121bfc696f1cf78714245dd2330b10141e23687fc54978cb63aa733394352437914a020465a8a123a1978beb37d357efbd39996b3719b70a65e62640050b97159a