Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe
Resource
win10v2004-20240226-en
General
-
Target
a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe
-
Size
25KB
-
MD5
f37d47f0e458df737e3c29059a9b13c9
-
SHA1
d736644621ec8cd8f74cad3f92a8a1c12d43ce25
-
SHA256
a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18
-
SHA512
642968c5d4cb515e61ddce0e8913a2f59df5d950273bdb1100cc6e45427d00a9594efd85a6e1224ea91095f327fdc793f8380b6f19429b3b6bd441356db723d2
-
SSDEEP
384:O/HTfut04H5wakydVf/4xQ8uFvTtk4Fe3baIYdh7hEvK76nZS:O/zcJ5Pf/r8urkp3bxHv+64
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2068 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2352 a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2068 2352 a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe 28 PID 2352 wrote to memory of 2068 2352 a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe 28 PID 2352 wrote to memory of 2068 2352 a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe 28 PID 2352 wrote to memory of 2068 2352 a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe"C:\Users\Admin\AppData\Local\Temp\a939db680c17235feba8c126578676716ec1f71bcda4ad04e7e76a4673335b18.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD50d13522e0c1aee17c3e134db418aecac
SHA1f00b5ecec06bfee7a71e9a75eae85f4f48292b7c
SHA2561579c95e4c0a1cd092046e787e269283b2992332902b2f23c92745208c12a5d6
SHA5128c63cacff229afa90c5b66c0d15f2c3caa0888347b5df9404b1211b2b838f6bf6a808672a5adb641482308a2657b58d138e7fef7166d0c9870f4c6ea3c533aef