Analysis
-
max time kernel
102s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
e7bf64fe38428efca261bd8d5f7db8a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e7bf64fe38428efca261bd8d5f7db8a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e7bf64fe38428efca261bd8d5f7db8a0N.exe
-
Size
9KB
-
MD5
e7bf64fe38428efca261bd8d5f7db8a0
-
SHA1
d28625c13ae8bb5ee12e5bc47516d36be1b81478
-
SHA256
76457251610236a58e25f055d0562c07f82ee4126ebea919c25a03afadbbe5dc
-
SHA512
7767121b40625d73c5f573a4b0ca5b04a3db0e041fa0cd35e1645dce77ba47c48ce3669cea18f6b89a900026357cedff1af61f85a6c9d20ec1f08f68a8924998
-
SSDEEP
192:/YXn/CQWRIgSXil3jOAhyHm+CGUoG1fqa/:/QaQWRIgSmByHmcxa/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation e7bf64fe38428efca261bd8d5f7db8a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7bf64fe38428efca261bd8d5f7db8a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 324 wrote to memory of 2840 324 e7bf64fe38428efca261bd8d5f7db8a0N.exe 87 PID 324 wrote to memory of 2840 324 e7bf64fe38428efca261bd8d5f7db8a0N.exe 87 PID 324 wrote to memory of 2840 324 e7bf64fe38428efca261bd8d5f7db8a0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7bf64fe38428efca261bd8d5f7db8a0N.exe"C:\Users\Admin\AppData\Local\Temp\e7bf64fe38428efca261bd8d5f7db8a0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5cff465f9bccf7e908ace014c64e0f122
SHA1d60c220aaa983299ecf1a993d49da88b309df2fc
SHA256960bcb348ff71eb2ea1719020386eb20bdb518143e140b2afc11457f93eafd4d
SHA512e26dd5afebed1875680dacb92eda2329cc796113731f3c85dd11a0717e69264c479df43f4c07039e78549de43c2065f8106baceb85d223fbfe4b2bb4b859e0b2