Analysis
-
max time kernel
62s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe
Resource
win10v2004-20240419-en
General
-
Target
b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe
-
Size
125KB
-
MD5
a891c843d76d0ff0738e6219d00ed006
-
SHA1
a35afcaf2885fa223d4663cf5d3604a6709bbb76
-
SHA256
b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c
-
SHA512
399fecbb0f52e0048d03fb0b5a3cbb5861df514f977406bc5870b47a96d909989e3fa28f4f18342e9dbf1abbf73ba5107917f83cfb7757da0188bdc58501b49f
-
SSDEEP
384:2Q/VTtY/7iMmQgVCO02JWuCSPmSQAt6SVT9Nm8pPHAsqFaB8wdCMtZub5oqDopm2:dUF2JTPRQAJi85Lqa2MtXcoELS
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/memory/1004-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/files/0x000d000000023b2e-7.dat UPX behavioral2/memory/2904-12-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1004-11-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2904-15-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1004 wrote to memory of 2904 1004 b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe 85 PID 1004 wrote to memory of 2904 1004 b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe 85 PID 1004 wrote to memory of 2904 1004 b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe"C:\Users\Admin\AppData\Local\Temp\b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5c069c39a21ca9c8cd011990427b0b631
SHA14b0565f766a2ad9998fc57c34b265f8a20bc857e
SHA256ffcbe8ccbf27449a96a98543176c2e75220b5b13193a759cab7b46b6a13d2f87
SHA5127072d39d1875d4da804fd0f78fcfbdee3fd135695bf6c9eb7fb229d510e4149bdc4ceb64003ddf912e4bd732f09ca096f4d44689c86fa01ee210b776357474a1