Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 16:03

General

  • Target

    e693c8c0e897ab4ea5f1ddd8e4a31a5a.exe

  • Size

    10KB

  • MD5

    e693c8c0e897ab4ea5f1ddd8e4a31a5a

  • SHA1

    97f1ef321cf0e549f2c58f6b6f67b2ced1fda1e4

  • SHA256

    4aa75bbb43f871cb11e05975571e7729568b88414b8e2080b44c61a4233dfa31

  • SHA512

    b61e668f4ba9a63c73601b4c1f1d51c5aa874a0030aed119bd952dd9e7405fb1741ccfb85b4dced211bba577312ec31319d81be2c6b03f06e0262733949bf090

  • SSDEEP

    192:ibrETxL4X4f0y4PtMixu672r8jhTfgpY6sTn3IpSY8:iXET14X4f0y4aifBjhrk6+SZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e693c8c0e897ab4ea5f1ddd8e4a31a5a.exe
    "C:\Users\Admin\AppData\Local\Temp\e693c8c0e897ab4ea5f1ddd8e4a31a5a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    10KB

    MD5

    39ea79e982f1e3efbe9476e30df11374

    SHA1

    d667f2a011e1192e4e51c19324266f351e3c099a

    SHA256

    effd53805d2382ec17a28c51fb7ec6df508f60fd01918158c191b3b5a0c259aa

    SHA512

    f3f04e59dd960bf2e7ed5fa1d98ca5c48915e3f01e975dde84819b035956f0957c60dcd8792dd083b8feac97539c1a060993f028364904c7ab37e16c2c4ac3e1