Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2023 19:45
Static task
static1
Behavioral task
behavioral1
Sample
c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe
-
Size
9KB
-
MD5
c4e050aa2901e21f7ae8100efd65d5f0
-
SHA1
a0b9cdcb818e915eb2780b2df32fe7744c070a94
-
SHA256
d12034b8fe059579fbe9988f614ee3838619929ea1e46430f36bd3377150f8d2
-
SHA512
8dffef651709632919432fa73dc6a6b3404dcfa89d39f08c1e598631b1f8ea4ae6f9fad3969352e68ad4d5bb010665d443accb04cc5f459d19b55c01249d4245
-
SSDEEP
96:xQ/yyYKtUsxJbQBtgDuAnQWRIUF2CmBER9xVTkrjkPq/yfAkyukRoINEAGKhkIui:HymZSrQWRIcSSWbafKoeGKh6AWPRF+D7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe -
Executes dropped EXE 1 IoCs
pid Process 3188 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3188 2476 c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe 83 PID 2476 wrote to memory of 3188 2476 c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe 83 PID 2476 wrote to memory of 3188 2476 c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\c4e050aa2901e21f7ae8100efd65d5f0_exe32.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:3188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5c5b8ea37bedfb1f836356e42724bc078
SHA13860aaca9b986a7a99d6ae37f991bbb746ba0039
SHA256e397d64cbb28fd7aa57ce885e0efd5139ea8ee23e5c0146714721fd0e1480e06
SHA51234c7f9f4381345c366376571dfacd2396dbf269b2e80823d2fc7b84bc1a1e216f0b97a36a2548dbbac3a88f46f08b492e1cf340f66c5bc9f31c91d0ab7d3348f
-
Filesize
9KB
MD5c5b8ea37bedfb1f836356e42724bc078
SHA13860aaca9b986a7a99d6ae37f991bbb746ba0039
SHA256e397d64cbb28fd7aa57ce885e0efd5139ea8ee23e5c0146714721fd0e1480e06
SHA51234c7f9f4381345c366376571dfacd2396dbf269b2e80823d2fc7b84bc1a1e216f0b97a36a2548dbbac3a88f46f08b492e1cf340f66c5bc9f31c91d0ab7d3348f
-
Filesize
9KB
MD5c5b8ea37bedfb1f836356e42724bc078
SHA13860aaca9b986a7a99d6ae37f991bbb746ba0039
SHA256e397d64cbb28fd7aa57ce885e0efd5139ea8ee23e5c0146714721fd0e1480e06
SHA51234c7f9f4381345c366376571dfacd2396dbf269b2e80823d2fc7b84bc1a1e216f0b97a36a2548dbbac3a88f46f08b492e1cf340f66c5bc9f31c91d0ab7d3348f