Analysis

  • max time kernel
    102s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 15:07

General

  • Target

    e7bf64fe38428efca261bd8d5f7db8a0N.exe

  • Size

    9KB

  • MD5

    e7bf64fe38428efca261bd8d5f7db8a0

  • SHA1

    d28625c13ae8bb5ee12e5bc47516d36be1b81478

  • SHA256

    76457251610236a58e25f055d0562c07f82ee4126ebea919c25a03afadbbe5dc

  • SHA512

    7767121b40625d73c5f573a4b0ca5b04a3db0e041fa0cd35e1645dce77ba47c48ce3669cea18f6b89a900026357cedff1af61f85a6c9d20ec1f08f68a8924998

  • SSDEEP

    192:/YXn/CQWRIgSXil3jOAhyHm+CGUoG1fqa/:/QaQWRIgSmByHmcxa/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7bf64fe38428efca261bd8d5f7db8a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e7bf64fe38428efca261bd8d5f7db8a0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    10KB

    MD5

    cff465f9bccf7e908ace014c64e0f122

    SHA1

    d60c220aaa983299ecf1a993d49da88b309df2fc

    SHA256

    960bcb348ff71eb2ea1719020386eb20bdb518143e140b2afc11457f93eafd4d

    SHA512

    e26dd5afebed1875680dacb92eda2329cc796113731f3c85dd11a0717e69264c479df43f4c07039e78549de43c2065f8106baceb85d223fbfe4b2bb4b859e0b2