Analysis

  • max time kernel
    124s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 01:50

General

  • Target

    b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe

  • Size

    125KB

  • MD5

    a891c843d76d0ff0738e6219d00ed006

  • SHA1

    a35afcaf2885fa223d4663cf5d3604a6709bbb76

  • SHA256

    b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c

  • SHA512

    399fecbb0f52e0048d03fb0b5a3cbb5861df514f977406bc5870b47a96d909989e3fa28f4f18342e9dbf1abbf73ba5107917f83cfb7757da0188bdc58501b49f

  • SSDEEP

    384:2Q/VTtY/7iMmQgVCO02JWuCSPmSQAt6SVT9Nm8pPHAsqFaB8wdCMtZub5oqDopm2:dUF2JTPRQAJi85Lqa2MtXcoELS

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe
    "C:\Users\Admin\AppData\Local\Temp\b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    126KB

    MD5

    c069c39a21ca9c8cd011990427b0b631

    SHA1

    4b0565f766a2ad9998fc57c34b265f8a20bc857e

    SHA256

    ffcbe8ccbf27449a96a98543176c2e75220b5b13193a759cab7b46b6a13d2f87

    SHA512

    7072d39d1875d4da804fd0f78fcfbdee3fd135695bf6c9eb7fb229d510e4149bdc4ceb64003ddf912e4bd732f09ca096f4d44689c86fa01ee210b776357474a1

  • memory/1960-0-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1960-2-0x0000000002C20000-0x0000000002C21000-memory.dmp

    Filesize

    4KB

  • memory/1960-3-0x0000000002C30000-0x0000000003030000-memory.dmp

    Filesize

    4.0MB

  • memory/1960-9-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2916-12-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/2916-13-0x00000000029C0000-0x0000000002DC0000-memory.dmp

    Filesize

    4.0MB

  • memory/2916-10-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2916-26-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB