Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 04:19

General

  • Target

    cc19955f46d6930bd122e3b56f2dcf0deb7deae15cb132a90e5b0566fe53b58e.exe

  • Size

    610KB

  • MD5

    04fb6d98eaa01ee5c0679f3564ea7ae1

  • SHA1

    5a353be41228fad244d078ac00d63b5949d751ef

  • SHA256

    cc19955f46d6930bd122e3b56f2dcf0deb7deae15cb132a90e5b0566fe53b58e

  • SHA512

    e5966a0570ced41239a0568027d9ab58bd8b1fd241339193abaf6f22e7a94c7027a9026846d2e151dd4498a61b6fb8715a90919e65bfaf892832f001c3e23914

  • SSDEEP

    6144:NptVO7mOV1u9MV0ue9Ya47I9Ya4oXtamAV3vQnx04EFtUXMamoa9tG6tP/q8f/P0:NhEDfP/q8fmRYCKREDAE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc19955f46d6930bd122e3b56f2dcf0deb7deae15cb132a90e5b0566fe53b58e.exe
    "C:\Users\Admin\AppData\Local\Temp\cc19955f46d6930bd122e3b56f2dcf0deb7deae15cb132a90e5b0566fe53b58e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2776

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          610KB

          MD5

          1ad57efa06ae4d488f4217af5937b9a0

          SHA1

          d97764129233153688b24384fdaa33aeb4bb9ae3

          SHA256

          537af5dc66cf336274b99ee6f70359d76555db66732632ab5cfe430b05813f01

          SHA512

          a56c6bf317a74e5baa3b0b027c069f8254ee61c605e25d8da9095745cb430d0d438e4502863196c17b09e04bdea0178d83e46d2c7ed3644834384d129dca36d0

        • memory/1936-0-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/1936-2-0x0000000001E70000-0x0000000001E71000-memory.dmp

          Filesize

          4KB

        • memory/1936-3-0x0000000002C30000-0x0000000003030000-memory.dmp

          Filesize

          4.0MB

        • memory/1936-7-0x00000000032D0000-0x000000000336A000-memory.dmp

          Filesize

          616KB

        • memory/1936-11-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/2776-12-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB

        • memory/2776-15-0x0000000002BD0000-0x0000000002FD0000-memory.dmp

          Filesize

          4.0MB

        • memory/2776-14-0x0000000001E90000-0x0000000001E91000-memory.dmp

          Filesize

          4KB

        • memory/2776-30-0x0000000000400000-0x000000000049A000-memory.dmp

          Filesize

          616KB