Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 05:57

General

  • Target

    e3a394ec47abb5df379cc4171b61f3d0N.exe

  • Size

    27KB

  • MD5

    e3a394ec47abb5df379cc4171b61f3d0

  • SHA1

    0891c283e1a6494d66370188c82207977f11c34d

  • SHA256

    bddef8248f448cc5e3ad774f108f42f300717c3fbcc2d46f33d6a7b3cc3a2d5e

  • SHA512

    e4febe45e4bf3e56643423b05353f4dc9146bc2358efe6172e2722ea396eb1eb5762c8d35cbf7bbdc7604ea92119a86e20efeb5d34e5f4be946bb843fe074a4e

  • SSDEEP

    192:kWu2F9EYpmaAsiE/HiogbJgigbGgSgFIEhgbn6fBNYrBJgigbYdKEKQ:w2F9EYpD/L/DYPvPoLfCPyQ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3a394ec47abb5df379cc4171b61f3d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e3a394ec47abb5df379cc4171b61f3d0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    27KB

    MD5

    3548feedb5a670f0b01d668028329889

    SHA1

    5567cff0de2d2cafcbdf913cf027f8a5fd8dac70

    SHA256

    35af729085248d03087f7c52b463e88b087731e8553ecff04bd59ed7bf3a3c6f

    SHA512

    14120cc072142daae9fb6441c7646f8570d7f07c7001841e84340aefdf8aca7089aafff305aa575a732836a6feacb6629f3be5e60675c6d4c1e9e8376fb28cc4

  • memory/1764-16-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1772-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1772-8-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB