Analysis

  • max time kernel
    80s
  • max time network
    71s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 00:03

General

  • Target

    a2626f5de1f10783ee1888bc83a193c0N.exe

  • Size

    37KB

  • MD5

    a2626f5de1f10783ee1888bc83a193c0

  • SHA1

    7ace9d7dabe77952d0e00815538eba823e6b2871

  • SHA256

    d0024df3740dc6934b9bd9e61c96109322a3b1739f4ff48a39c152d98f379f5f

  • SHA512

    d06c48aae7f4ebeb2665b6dea1c7d02d11512b0bd2cece5bc9527316a566acbdfe31d3db133e1ec4584f221efe767cba4c74b7aba3a02d7a2aae03677f79e63d

  • SSDEEP

    384:sACDQL/TQfYjQXoHyglpIK0KY46QXEVvYpVAiq8sSKpEH0:sXQLGCQYHyYtX8vePU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2626f5de1f10783ee1888bc83a193c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a2626f5de1f10783ee1888bc83a193c0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:2520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          37KB

          MD5

          f8bd9a6d05e0b19d8cf31da88bc44b00

          SHA1

          3800ca8240977b1efa1021c573724dfdfc65a5f8

          SHA256

          cdf0405b37f08d91c9e8f758c9b6b89eb7eb3574ae2225efff6e9c57c53cc3c6

          SHA512

          1bb595bc56a77316ae630d8faa82b6c9604b86f1944c0f50d9b35ebd88a233fcc184b83b45e20c04da521f43933f7c112bd04aaf903d541f6cf5797ca948413f

        • memory/1976-0-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/1976-1-0x00000000033B0000-0x00000000033B1000-memory.dmp

          Filesize

          4KB

        • memory/1976-7-0x00000000033C0000-0x00000000037C0000-memory.dmp

          Filesize

          4.0MB

        • memory/1976-10-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/1976-8-0x0000000003900000-0x000000000390C000-memory.dmp

          Filesize

          48KB

        • memory/2520-11-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2520-12-0x00000000034C0000-0x00000000034C1000-memory.dmp

          Filesize

          4KB

        • memory/2520-14-0x00000000034D0000-0x00000000038D0000-memory.dmp

          Filesize

          4.0MB

        • memory/2520-27-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB