Analysis

  • max time kernel
    62s
  • max time network
    58s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2024 01:50

General

  • Target

    b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe

  • Size

    125KB

  • MD5

    a891c843d76d0ff0738e6219d00ed006

  • SHA1

    a35afcaf2885fa223d4663cf5d3604a6709bbb76

  • SHA256

    b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c

  • SHA512

    399fecbb0f52e0048d03fb0b5a3cbb5861df514f977406bc5870b47a96d909989e3fa28f4f18342e9dbf1abbf73ba5107917f83cfb7757da0188bdc58501b49f

  • SSDEEP

    384:2Q/VTtY/7iMmQgVCO02JWuCSPmSQAt6SVT9Nm8pPHAsqFaB8wdCMtZub5oqDopm2:dUF2JTPRQAJi85Lqa2MtXcoELS

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe
    "C:\Users\Admin\AppData\Local\Temp\b7fafb346ea5a95ddfba454bdd7a0730a717992faf40923328d8ebbbdcbea88c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    126KB

    MD5

    c069c39a21ca9c8cd011990427b0b631

    SHA1

    4b0565f766a2ad9998fc57c34b265f8a20bc857e

    SHA256

    ffcbe8ccbf27449a96a98543176c2e75220b5b13193a759cab7b46b6a13d2f87

    SHA512

    7072d39d1875d4da804fd0f78fcfbdee3fd135695bf6c9eb7fb229d510e4149bdc4ceb64003ddf912e4bd732f09ca096f4d44689c86fa01ee210b776357474a1

  • memory/1004-0-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1004-2-0x00000000027E0000-0x00000000027E1000-memory.dmp

    Filesize

    4KB

  • memory/1004-3-0x00000000027F0000-0x0000000002BF0000-memory.dmp

    Filesize

    4.0MB

  • memory/1004-11-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2904-12-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2904-13-0x0000000002570000-0x0000000002571000-memory.dmp

    Filesize

    4KB

  • memory/2904-14-0x00000000025A0000-0x00000000029A0000-memory.dmp

    Filesize

    4.0MB

  • memory/2904-15-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB