Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2024 20:43

General

  • Target

    4c699340feacbea75ec1e48b307132b1.exe

  • Size

    7KB

  • MD5

    4c699340feacbea75ec1e48b307132b1

  • SHA1

    e2729146761d9a85996848ece998739a3e6b5f68

  • SHA256

    efbebfc0e3d79945bcd5362f3205008a298cb7907dda18afbb73b19613c27a9f

  • SHA512

    5ccf47bf75253695c3edb088487df900b4fc428d7f42b5f0cdbd24b13603a5a4d48ba5789edfa02ca6d8166459983663a9a26bae44f9348b805e9e64482a2c7b

  • SSDEEP

    96:fNJEEvtcUF7xAnQWRIUZ2CmKv5PF2wGkGzCHl6iCLk3+1E1knkskN:XEYWQWRIgSU5PenzCHlXGO+++c

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c699340feacbea75ec1e48b307132b1.exe
    "C:\Users\Admin\AppData\Local\Temp\4c699340feacbea75ec1e48b307132b1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    8KB

    MD5

    54178453a528f34696d08c7fe3ce7e07

    SHA1

    23caf883ee0a13782628cdc38a84eb56ad714e17

    SHA256

    074eaf763929a06bfb11e82351bfa33e12ce2ee394b5858147943e29690a5ff6

    SHA512

    2c02438d29ba85982e6a3271ce8e99a5193ef3cb4ad7d25a06b7776a042212df085bf0e58c21bc73a0674f131b629c379e336bee2483075c9e13a788e1c73da1