Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 12:06

General

  • Target

    37bc930af8b39bd11bcb934f19c03080N.exe

  • Size

    5KB

  • MD5

    37bc930af8b39bd11bcb934f19c03080

  • SHA1

    6a520226ba4f0c521b4c2ade47d397ae8d9b5e30

  • SHA256

    b635e18b2855bc69c2c77d537a058b866761dcd93b45e8ab9ffd868a71bea6c9

  • SHA512

    38da15d06e9fe84a80d184160f7cfdb7238237ea9129a7b4e023a3fbd96db6a931b3b30e5aefb28602eb34889d635005b755a7bbee1eafebc0d66a94f1f79563

  • SSDEEP

    48:qd7SNUoHvjBrmJVeDhMRdO//GLlH4qnijDGrsEVnQBG/RA8lGUZ2CS7jLyUF0uYl:2mRjDhYH4ZjxAnQWRIUZ2CmXQhAqX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37bc930af8b39bd11bcb934f19c03080N.exe
    "C:\Users\Admin\AppData\Local\Temp\37bc930af8b39bd11bcb934f19c03080N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:3488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    5KB

    MD5

    dc992f6cf7c072737930e84b5fda4f44

    SHA1

    d1517ef998b9b3205ee74fad95915f9ab7acf74b

    SHA256

    562ec5f5073ec171e4bf65053a98002b3aa8629c7748035b17e26077912a500c

    SHA512

    5112c326951b42fe6fc4dcbd0113a307757ca53860fc59cb63d6041a4e2e2ba36eb6fd0bf36a704771707da38fe96b5dd14a3c4555aadebcfb8dd85d45bfc10d