Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 23:58
Behavioral task
behavioral1
Sample
ee7dd8bbd4defb282eae880577fc6200N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ee7dd8bbd4defb282eae880577fc6200N.exe
Resource
win10v2004-20240802-en
General
-
Target
ee7dd8bbd4defb282eae880577fc6200N.exe
-
Size
955KB
-
MD5
ee7dd8bbd4defb282eae880577fc6200
-
SHA1
52269570cfa0efa466c9505b7f5538c8412cde70
-
SHA256
21bee7d02188387833f3ad000ee9a7117a1f0bd6f305f826fe1146a6724d06dd
-
SHA512
063a7bb45eda2c8e802107dc2c647a19b96733f645bc8da392ff2dc5fb9e4a514ca2f23a6a92c35e9b317de8a7a60429910baf9ce6569f0f9ea8179deaf20458
-
SSDEEP
24576:rMjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsx7:mJ5gEKNikf3hBfUiWx7
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
resource yara_rule behavioral2/files/0x000900000002341f-7.dat family_ammyyadmin -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation ee7dd8bbd4defb282eae880577fc6200N.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 budha.exe -
resource yara_rule behavioral2/memory/4600-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x000900000002341f-7.dat upx behavioral2/memory/4600-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/5084-20-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee7dd8bbd4defb282eae880577fc6200N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4600 wrote to memory of 5084 4600 ee7dd8bbd4defb282eae880577fc6200N.exe 86 PID 4600 wrote to memory of 5084 4600 ee7dd8bbd4defb282eae880577fc6200N.exe 86 PID 4600 wrote to memory of 5084 4600 ee7dd8bbd4defb282eae880577fc6200N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee7dd8bbd4defb282eae880577fc6200N.exe"C:\Users\Admin\AppData\Local\Temp\ee7dd8bbd4defb282eae880577fc6200N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
956KB
MD51a982376d6d2b46cc4a6c28f39784b61
SHA1ecbe2948b051d54365d30b7d2d0b94c4538b3323
SHA2560ac3b06df9eca2702237562ba6605ddf76368a7401cadca42e48e297475ce010
SHA512b2303b7c70c46d8b094b7b0991a1380066152c429d513fdaa02ed9551ed1caafdd1929083705caf305bce46941bc588a781890c0c4c776f14b35b992b6cb4116