Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 23:17

General

  • Target

    6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe

  • Size

    30KB

  • MD5

    f849f71ea556f7f46866aa9b59c8e603

  • SHA1

    4687b9eeefe9e6aff436a7469fd4184e56da1954

  • SHA256

    6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89

  • SHA512

    2087be85f86f6759e7bf0ddc92ee7c17180a506cb4748cb5b1dd95a296350a33052ef71932141509537a416d05e0738c0f53ebc88c011b9d0ffa3353534fb000

  • SSDEEP

    384:iV5oYI3DL2owySV01fPYRbyR3m/AqGHJ5tPfdcZg4N/I6+x3kxeeDvDKLp:s5oVDL2P0KbyR3HJT9n2F+VGKLp

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe
    "C:\Users\Admin\AppData\Local\Temp\6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:1672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    30KB

    MD5

    3bc1561c9b3ce50fc9735e07839c1679

    SHA1

    9d28b21019ae11bc9f8b9f42c08a9cee8faa0c23

    SHA256

    c4ba98bfdf2593f76900aa92179b8a49a7a5d1423d6b6cf9c3d9665a32682e40

    SHA512

    256a859c4f16d87b3044faaf8f0a575c14008e3398d0cfb3b959c890a1d069ef5ad3b388b547b48b728af9b76f0d2743df5ea8db9791ce2ef52cf5e49ef6794e

  • memory/1600-0-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1600-1-0x00000000021D0000-0x00000000021D1000-memory.dmp

    Filesize

    4KB

  • memory/1600-3-0x0000000002170000-0x0000000002177000-memory.dmp

    Filesize

    28KB

  • memory/1600-12-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1672-11-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1672-13-0x00000000021D0000-0x00000000021D1000-memory.dmp

    Filesize

    4KB

  • memory/1672-14-0x0000000001EF0000-0x0000000001EF7000-memory.dmp

    Filesize

    28KB

  • memory/1672-16-0x0000000001EF0000-0x0000000001EF7000-memory.dmp

    Filesize

    28KB