Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe
Resource
win10v2004-20240412-en
General
-
Target
6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe
-
Size
30KB
-
MD5
f849f71ea556f7f46866aa9b59c8e603
-
SHA1
4687b9eeefe9e6aff436a7469fd4184e56da1954
-
SHA256
6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89
-
SHA512
2087be85f86f6759e7bf0ddc92ee7c17180a506cb4748cb5b1dd95a296350a33052ef71932141509537a416d05e0738c0f53ebc88c011b9d0ffa3353534fb000
-
SSDEEP
384:iV5oYI3DL2owySV01fPYRbyR3m/AqGHJ5tPfdcZg4N/I6+x3kxeeDvDKLp:s5oVDL2P0KbyR3HJT9n2F+VGKLp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\Control Panel\International\Geo\Nation 6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe -
Executes dropped EXE 1 IoCs
pid Process 1672 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1672 1600 6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe 89 PID 1600 wrote to memory of 1672 1600 6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe 89 PID 1600 wrote to memory of 1672 1600 6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe"C:\Users\Admin\AppData\Local\Temp\6aa44c8d43f04e105579b6bb0427554388fe8d3cd3d48475c234a9cf8d103e89.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD53bc1561c9b3ce50fc9735e07839c1679
SHA19d28b21019ae11bc9f8b9f42c08a9cee8faa0c23
SHA256c4ba98bfdf2593f76900aa92179b8a49a7a5d1423d6b6cf9c3d9665a32682e40
SHA512256a859c4f16d87b3044faaf8f0a575c14008e3398d0cfb3b959c890a1d069ef5ad3b388b547b48b728af9b76f0d2743df5ea8db9791ce2ef52cf5e49ef6794e