Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 13:58

General

  • Target

    9d99921dbd743ce66edcfc02ae9b3608fc6ce962ea4c879dc22d0b8ace05fdbf.exe

  • Size

    24KB

  • MD5

    6bc5f4068df53a1045dae27781348b80

  • SHA1

    3f9478517d63494e9fa225a8396afdd1312696e3

  • SHA256

    9d99921dbd743ce66edcfc02ae9b3608fc6ce962ea4c879dc22d0b8ace05fdbf

  • SHA512

    ab39e6ad6788829284ab7971f1a373dc30bccfeae84f23a3c3a34258c3a1314990f78528f953cf4d45814ec1d3fd29a07e5153af6e7189e3959ae69a1595464f

  • SSDEEP

    384:BGkj2hrdl9pRtn6koKs1bz905rAuHLBUr/BwWVR0McRet:BGZlmBwrAcUrZwWrxt

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d99921dbd743ce66edcfc02ae9b3608fc6ce962ea4c879dc22d0b8ace05fdbf.exe
    "C:\Users\Admin\AppData\Local\Temp\9d99921dbd743ce66edcfc02ae9b3608fc6ce962ea4c879dc22d0b8ace05fdbf.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:2548

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          24KB

          MD5

          bbeb4bfad36845447ad0bf6d6059a7ff

          SHA1

          78363d7b5b15c56c4e328ddfea3dfa3c464bc601

          SHA256

          55ee5ed4360844db346524bcceb7eac5ab5022979c0c392c5737cfc09a9a767a

          SHA512

          a0786429642eee2e941c33021011a089ec8b817029b1cf023d71ec3dcefeab6b1bbd68a655dbcf5d9d0669d6185909cb119731922d4f582a23b659a51fc22fba

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          24KB

          MD5

          bbeb4bfad36845447ad0bf6d6059a7ff

          SHA1

          78363d7b5b15c56c4e328ddfea3dfa3c464bc601

          SHA256

          55ee5ed4360844db346524bcceb7eac5ab5022979c0c392c5737cfc09a9a767a

          SHA512

          a0786429642eee2e941c33021011a089ec8b817029b1cf023d71ec3dcefeab6b1bbd68a655dbcf5d9d0669d6185909cb119731922d4f582a23b659a51fc22fba

        • memory/2548-137-0x0000000002430000-0x0000000002830000-memory.dmp

          Filesize

          4.0MB

        • memory/2548-138-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3588-132-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3588-133-0x00000000025E0000-0x00000000029E0000-memory.dmp

          Filesize

          4.0MB