Analysis

  • max time kernel
    162s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 22:01

General

  • Target

    966bafaf083854906dd2014c5e65810f21a708c0dca2e6565f62bac7cf9f3f89.exe

  • Size

    65KB

  • MD5

    86f1d675ede4e375646175a18309acf6

  • SHA1

    899272d219a781e19b234f480a07f13a949c99f6

  • SHA256

    966bafaf083854906dd2014c5e65810f21a708c0dca2e6565f62bac7cf9f3f89

  • SHA512

    6eae7b1af1c213990157d0dc62b0bc97453aa4d26d411bb8b18843948cf4da31e06c9bfc521d5f7133e52991993462738e34ae93b8f1f2576445c12b899c2a7f

  • SSDEEP

    768:ArOb1QF5kMtFC9LuryNzZHvAe5d/LfWOf01+tLNQGVAbOuf19jbEpDWIajDsXPhK:NB+FC9RntfWeoGiPyCHjKDjfQQQtUe39

Score
9/10

Malware Config

Signatures

  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\966bafaf083854906dd2014c5e65810f21a708c0dca2e6565f62bac7cf9f3f89.exe
    "C:\Users\Admin\AppData\Local\Temp\966bafaf083854906dd2014c5e65810f21a708c0dca2e6565f62bac7cf9f3f89.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    65KB

    MD5

    6ef2fc1e1bccc2471de80fe898af32fa

    SHA1

    4209b7beb9a6b9a3194e55a93ba73f2dd9e50467

    SHA256

    5382774e48c99e09687739d2859c74d76e36a55e8d12b605f53b1a7346e50bf9

    SHA512

    b9ea4a6019cfdaecc94c4d8a1fe63f276d2dac752563d45ee1b5ccdc62ce69e849b5b70abf6a5568d6cd0d985d746f792abe6c75cac56477a4fbff8b7becd7ad

  • memory/2156-13-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2156-16-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2156-17-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/2156-18-0x0000000002710000-0x0000000002B10000-memory.dmp

    Filesize

    4.0MB

  • memory/2156-19-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3712-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3712-1-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3712-2-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3712-3-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB

  • memory/3712-5-0x0000000002730000-0x0000000002B30000-memory.dmp

    Filesize

    4.0MB

  • memory/3712-14-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB