Analysis

  • max time kernel
    133s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 01:34

General

  • Target

    d027715124bb16dd7b8aa8a74097adecbb3ef8997b76a2ad66b63a7f5c983c19.exe

  • Size

    22KB

  • MD5

    30ad7eff67a7aac9fb53571ec774e2c9

  • SHA1

    34ae2cc72a1310ffe22599319ee69eda3b5bd0bc

  • SHA256

    d027715124bb16dd7b8aa8a74097adecbb3ef8997b76a2ad66b63a7f5c983c19

  • SHA512

    dd41582192efa2098437f32795c7f6e024a632da7731b7e8a8c38aa9695535cd2fa55197583c71d1cbbaa0465d71ccfe1da1473abb5510eedecdd18d4cc0ed33

  • SSDEEP

    384:+2fSkTQ2VAS/o05ZWz4i3YLo8WB3DLfAvkiV417GLvWt99wiQ/ZBusBTJX:+iS4XFTO4eYLQ3vfA4JGLg9gZUO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d027715124bb16dd7b8aa8a74097adecbb3ef8997b76a2ad66b63a7f5c983c19.exe
    "C:\Users\Admin\AppData\Local\Temp\d027715124bb16dd7b8aa8a74097adecbb3ef8997b76a2ad66b63a7f5c983c19.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:4228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    22KB

    MD5

    7e7266159305bd20fe31e4c2e2866528

    SHA1

    b5727044a0040a36dcb24b2945244c9687c5f1be

    SHA256

    e8cb6033fc072cc785fbc2ae2f9075b9d5a7d1106d4a1e2c421da0d58d657a84

    SHA512

    21941e05ce55b96de9ca0bcedce5ee3edf094f2cb563447ff57140d07f378bfa228de6900b9d061d04e6bbcca537a12bad7757f434f58a71c8b24c2856c5425b

  • memory/4228-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4228-13-0x0000000002260000-0x0000000002261000-memory.dmp

    Filesize

    4KB

  • memory/4228-14-0x00000000005A0000-0x00000000005A7000-memory.dmp

    Filesize

    28KB

  • memory/4228-17-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4228-16-0x00000000005A0000-0x00000000005A7000-memory.dmp

    Filesize

    28KB

  • memory/4392-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4392-1-0x0000000000510000-0x0000000000511000-memory.dmp

    Filesize

    4KB

  • memory/4392-3-0x0000000002060000-0x0000000002067000-memory.dmp

    Filesize

    28KB

  • memory/4392-12-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB