Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
37bc930af8b39bd11bcb934f19c03080N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37bc930af8b39bd11bcb934f19c03080N.exe
Resource
win10v2004-20240704-en
General
-
Target
37bc930af8b39bd11bcb934f19c03080N.exe
-
Size
5KB
-
MD5
37bc930af8b39bd11bcb934f19c03080
-
SHA1
6a520226ba4f0c521b4c2ade47d397ae8d9b5e30
-
SHA256
b635e18b2855bc69c2c77d537a058b866761dcd93b45e8ab9ffd868a71bea6c9
-
SHA512
38da15d06e9fe84a80d184160f7cfdb7238237ea9129a7b4e023a3fbd96db6a931b3b30e5aefb28602eb34889d635005b755a7bbee1eafebc0d66a94f1f79563
-
SSDEEP
48:qd7SNUoHvjBrmJVeDhMRdO//GLlH4qnijDGrsEVnQBG/RA8lGUZ2CS7jLyUF0uYl:2mRjDhYH4ZjxAnQWRIUZ2CmXQhAqX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation 37bc930af8b39bd11bcb934f19c03080N.exe -
Executes dropped EXE 1 IoCs
pid Process 3488 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1028 wrote to memory of 3488 1028 37bc930af8b39bd11bcb934f19c03080N.exe 83 PID 1028 wrote to memory of 3488 1028 37bc930af8b39bd11bcb934f19c03080N.exe 83 PID 1028 wrote to memory of 3488 1028 37bc930af8b39bd11bcb934f19c03080N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\37bc930af8b39bd11bcb934f19c03080N.exe"C:\Users\Admin\AppData\Local\Temp\37bc930af8b39bd11bcb934f19c03080N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:3488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5dc992f6cf7c072737930e84b5fda4f44
SHA1d1517ef998b9b3205ee74fad95915f9ab7acf74b
SHA256562ec5f5073ec171e4bf65053a98002b3aa8629c7748035b17e26077912a500c
SHA5125112c326951b42fe6fc4dcbd0113a307757ca53860fc59cb63d6041a4e2e2ba36eb6fd0bf36a704771707da38fe96b5dd14a3c4555aadebcfb8dd85d45bfc10d