Analysis

  • max time kernel
    134s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2024 21:41

General

  • Target

    29dae596584e9e1508d146e4dca769d47e057fd9899d94d48a787aba723d20fd.exe

  • Size

    18KB

  • MD5

    7c8d5773608de107a12931b16a2cb0e3

  • SHA1

    738b289504b079d3c7a53316331aebda3184bd71

  • SHA256

    29dae596584e9e1508d146e4dca769d47e057fd9899d94d48a787aba723d20fd

  • SHA512

    365542393765e5f6a78fd7a4c7997eea9a4a74979bc96943adccfd97f630c70cdf833ab5985b7594c3d58c349d252586d552e4f74b1262e4746035df04630b32

  • SSDEEP

    192:wymTSrQWRIcaKNK0Omoarr5enSbs370m1dPIa5nAtujunESgcp:wxTsQWRIcaKHfoQ5enusrjAzzg2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29dae596584e9e1508d146e4dca769d47e057fd9899d94d48a787aba723d20fd.exe
    "C:\Users\Admin\AppData\Local\Temp\29dae596584e9e1508d146e4dca769d47e057fd9899d94d48a787aba723d20fd.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:4452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    19KB

    MD5

    8dd161a11c80c0cc0b8cc30367c620ad

    SHA1

    2702d91bbf793483f08ab6e3e44e6faae527a5e3

    SHA256

    92011ba4efd3aee61361ef9df1d2881fc9910d7e4deba55c5fdfefefc4391bea

    SHA512

    2172cdfb97ab357c1802dd551265c0b7b9174ed5147e55b63f9bc7fd387c79da73ee8d9e38c201f01c7432e874271588c486adee214be1ad229acc7d1de391ae

  • memory/2516-0-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2516-9-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB