Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2023, 03:49
Behavioral task
behavioral1
Sample
f8677576346574d225fb84c1ce1f37d9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f8677576346574d225fb84c1ce1f37d9.exe
Resource
win10v2004-20230220-en
General
-
Target
f8677576346574d225fb84c1ce1f37d9.exe
-
Size
1.2MB
-
MD5
f8677576346574d225fb84c1ce1f37d9
-
SHA1
e689376e002b46f9ba1826fc6854a97fe7a979b0
-
SHA256
3568482af799a90e5f9da1c1e47c24f9b1b6bb988071b7ab10700da330167e39
-
SHA512
23fb7d5ab9471d5dc019324596125c12bd7bbeb0f9e1bf90371b11a705f45f92e404ee084ba778970b13b803949d907ca2a87a91fb3a653c3ddb18ec2020a59d
-
SSDEEP
24576:KMjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxkkSTYuwzEcXUjhDr39n:XJ5gEKNikf3hBfUiWxkkSbwzEcEhDj9n
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023123-138.dat family_ammyyadmin behavioral2/files/0x0008000000023123-142.dat family_ammyyadmin behavioral2/files/0x0008000000023123-143.dat family_ammyyadmin -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation f8677576346574d225fb84c1ce1f37d9.exe -
Executes dropped EXE 1 IoCs
pid Process 3652 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4320 wrote to memory of 3652 4320 f8677576346574d225fb84c1ce1f37d9.exe 79 PID 4320 wrote to memory of 3652 4320 f8677576346574d225fb84c1ce1f37d9.exe 79 PID 4320 wrote to memory of 3652 4320 f8677576346574d225fb84c1ce1f37d9.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8677576346574d225fb84c1ce1f37d9.exe"C:\Users\Admin\AppData\Local\Temp\f8677576346574d225fb84c1ce1f37d9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:3652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ce46bc7f8fc4c0eb73838cc1b9975fea
SHA1700f66cdbb914047eac1e2e82cf0dd9b2b42f72d
SHA256511c4050b010acc927a0cc29431d8449d131bce7323aafd301912fffa1e2d896
SHA512781631f30f9fe7efb9c0628ee3cc98322c13289548abb874f94f538fd9d30e7b4b895d43e2d9096cc240cfd2174ec729745b8093c55fae2c5460427f162778d5
-
Filesize
1.2MB
MD5ce46bc7f8fc4c0eb73838cc1b9975fea
SHA1700f66cdbb914047eac1e2e82cf0dd9b2b42f72d
SHA256511c4050b010acc927a0cc29431d8449d131bce7323aafd301912fffa1e2d896
SHA512781631f30f9fe7efb9c0628ee3cc98322c13289548abb874f94f538fd9d30e7b4b895d43e2d9096cc240cfd2174ec729745b8093c55fae2c5460427f162778d5
-
Filesize
1.2MB
MD5ce46bc7f8fc4c0eb73838cc1b9975fea
SHA1700f66cdbb914047eac1e2e82cf0dd9b2b42f72d
SHA256511c4050b010acc927a0cc29431d8449d131bce7323aafd301912fffa1e2d896
SHA512781631f30f9fe7efb9c0628ee3cc98322c13289548abb874f94f538fd9d30e7b4b895d43e2d9096cc240cfd2174ec729745b8093c55fae2c5460427f162778d5