Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe
Resource
win10v2004-20240508-en
General
-
Target
1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe
-
Size
83KB
-
MD5
05f8e7f4619835138b4cc07c8c2cff30
-
SHA1
dacefd8ebb6708aa4871a63ce3f4d2ff4d754572
-
SHA256
1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4
-
SHA512
f59a6d285582c743dad0c4c43508615494d73e2b1ae4a926d744eca59aa27640ef5a924f5245768c5d49714897123d7771b51781b566cd07747febfac503eeb4
-
SSDEEP
1536:sB+FC9RntfWeoGiPyCHjKDjvQQQtUw2dfkoT/y2ZLJFC:sB+F8tfPN4yCDKDjvQQQtV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2128 budha.exe -
Loads dropped DLL 2 IoCs
pid Process 2176 1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe 2176 1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2128 2176 1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe 28 PID 2176 wrote to memory of 2128 2176 1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe 28 PID 2176 wrote to memory of 2128 2176 1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe 28 PID 2176 wrote to memory of 2128 2176 1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe"C:\Users\Admin\AppData\Local\Temp\1c0130a25ef35648b515bf14f3fc16a5628d2d98f7916d7e47e301a461ad31b4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD58f1576ee3a494cf398f1cbc3b3031d1a
SHA158057e80f650093a835cc7acf2fd62faaf891a63
SHA2562fc3cf757469381676040b56e4b812ee7b3e6beb6fe1861796e259230c6ed8a4
SHA5125021eddc7b86055870f5683711657e545b6c0e9b5e83a8614c87b9eb513872ffcb28ab43958382dc7dae1947e41ec80dca4c62a7e1aad03609d1e140cfda50fc