Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
abe8766de552303fd26df68554a78e40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
abe8766de552303fd26df68554a78e40N.exe
Resource
win10v2004-20240709-en
General
-
Target
abe8766de552303fd26df68554a78e40N.exe
-
Size
20KB
-
MD5
abe8766de552303fd26df68554a78e40
-
SHA1
7059a3f0d18ed96e15d054d2637265be661870cd
-
SHA256
28a4624845db5e886de5d19be7c9dc4e96a5fb2d8875d7175cf28b7fc167cfc4
-
SHA512
e9743d304230e9afce7b17336547b0673747e8860d72298b1d48ceca98f2417c8d4a965474a8717c15b7436a11937b933e81db733dad18323dea4b82b80396d4
-
SSDEEP
384:n+a1TQfYjQXViHa8q6QXEnLgi+M/+4H+YpXiq8sSqpEYp:n+a1GCQli686XgOM/Onc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 abe8766de552303fd26df68554a78e40N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3068 2016 abe8766de552303fd26df68554a78e40N.exe 30 PID 2016 wrote to memory of 3068 2016 abe8766de552303fd26df68554a78e40N.exe 30 PID 2016 wrote to memory of 3068 2016 abe8766de552303fd26df68554a78e40N.exe 30 PID 2016 wrote to memory of 3068 2016 abe8766de552303fd26df68554a78e40N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\abe8766de552303fd26df68554a78e40N.exe"C:\Users\Admin\AppData\Local\Temp\abe8766de552303fd26df68554a78e40N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5723be08dc2acf26d674240b396545871
SHA1fca8969e69f112b6d8e65e1bc5cd6bb2c7e18295
SHA256c60661313c89f3fbfc1bcfbc302c8b2786f274364b7022024d8a6d0741ce1b4e
SHA512cded87d607540a2ba9cbbb7902f67c286c458274840ddfae1902607d344500e5a912799cbf04a0e17fb5e5650c903e3b16910f4838f92320a6a6cc9ada5f13d6