Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe
Resource
win10v2004-20240508-en
General
-
Target
1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe
-
Size
68KB
-
MD5
c7fd1797222d78c7e6886afe75ebe351
-
SHA1
299245c7f82334b49cc89289e336dc0039cf74f6
-
SHA256
1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22
-
SHA512
0528ad938eb7c5fe1f350135044f10b4fa8c17f5233be4b0793ea7cf95ef457ed3dd51997649f899ca3cf3763354a2c5e543d53694e914929941c05473364ee6
-
SSDEEP
1536:NB+FC9RntfWeoGiPyCHjKDjfQQQtUe3ht:NB+F8tfPN4yCDKDjfQQQt/
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1656-1-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1656-3-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1656-5-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2908-16-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2908-17-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2908-19-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 2908 budha.exe -
Loads dropped DLL 2 IoCs
Processes:
1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exepid process 1656 1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe 1656 1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exedescription pid process target process PID 1656 wrote to memory of 2908 1656 1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe budha.exe PID 1656 wrote to memory of 2908 1656 1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe budha.exe PID 1656 wrote to memory of 2908 1656 1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe budha.exe PID 1656 wrote to memory of 2908 1656 1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe"C:\Users\Admin\AppData\Local\Temp\1842d9c7970096b4798a1d564c711919a260b73c4553049090ba06d949636f22.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5903aaff62aed4a75bd0541632cbb05c5
SHA1631fb71289d27c4615dda9c55dc5a3b761f0d29a
SHA2564f329fe42a8e51e1468b22e97fc5f7aa3095a7f1174219807417712d92e6f8c2
SHA512b0e0142cc8f86a511993c03feea6079f440e7c9e70d18174b99b6cc593b8f2c072bc2b57fae2425a6a736c0edfe0ae8abe828249d7fcbcbeb4852bb1e7655f98