Analysis
-
max time kernel
48s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe
Resource
win10v2004-20220901-en
General
-
Target
8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe
-
Size
19KB
-
MD5
a13b833a94073a7f7dc25b7d3ac2d153
-
SHA1
f2251d557f0bc4d93db6c1d9fea1a363405b42b3
-
SHA256
8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332
-
SHA512
8c9c94c2ee0fc8f12c11e31d0f626777de42918455a1ecc167d4aa64cd35cb60e748c96fcc4247325393c085f6256d9732a9b8bcb4bb510fb611bcd3eeb027dd
-
SSDEEP
192:1YOmJ2dUYnt0ZVJVx+zXIKk21NMvPktX13S3o+Iq7wOH55Ia1e/hPEB9y2:Vt0Zz+EdtvsGL5YxQP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 992 budha.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 992 3108 8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe 81 PID 3108 wrote to memory of 992 3108 8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe 81 PID 3108 wrote to memory of 992 3108 8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe"C:\Users\Admin\AppData\Local\Temp\8cbd43536725c094427d2e2656b760bd3d412dc632de14436882bd359284c332.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5eecc28753ef9662696578e3a19e8f1dc
SHA18764e5e22315c42e98984f0cad1909f0968e8a4f
SHA2569cbe9017dc6de12b9329873533859e19d48827e52e53bf98964c011b121f2bee
SHA51215bbfab16b9c6d1ab9f2fd381c59150e32c13c5c63b1e5b294b85dc90f4cb9815b7a6f0cba05602121f8303154138616f1fcde7e6a7a4dd8785973d494c2987b
-
Filesize
19KB
MD5eecc28753ef9662696578e3a19e8f1dc
SHA18764e5e22315c42e98984f0cad1909f0968e8a4f
SHA2569cbe9017dc6de12b9329873533859e19d48827e52e53bf98964c011b121f2bee
SHA51215bbfab16b9c6d1ab9f2fd381c59150e32c13c5c63b1e5b294b85dc90f4cb9815b7a6f0cba05602121f8303154138616f1fcde7e6a7a4dd8785973d494c2987b