Analysis

  • max time kernel
    111s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 12:28

General

  • Target

    ecbb1f01168bbe00fcee8ef1cf986e00N.exe

  • Size

    23KB

  • MD5

    ecbb1f01168bbe00fcee8ef1cf986e00

  • SHA1

    a5057d7499849058a2861371d25ef4e7f89ca7df

  • SHA256

    258a6228c1c820c9c6994605192bef5644f7b93a6e4371e6d7af731b5d53a026

  • SHA512

    d371e339344e42337f270e5f57e25208883c72a05cbc3da4dd9999f4e447e76584feebc050d3046e12f9657d571e3ef1308fa0e62a99d13be1b08657e615c7b4

  • SSDEEP

    384:bAmt53ZsCQ4P+GhplI+22rL7bJ0qLPXa0w1X+jv9LLaPaoE/do:bJHsCJ+Ghg+22rL7bJ0qLPXa0NjF5JW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecbb1f01168bbe00fcee8ef1cf986e00N.exe
    "C:\Users\Admin\AppData\Local\Temp\ecbb1f01168bbe00fcee8ef1cf986e00N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    23KB

    MD5

    18bc42885415f9d4b7d543082e0a69b9

    SHA1

    035b2fb4c7885ae39872c41fa3dd32d20cfb1d39

    SHA256

    e0d605453ebbe624d03209fb2b508e9a85b12733f4bf5e7cdebdddae33eed5d5

    SHA512

    014db370d272a20f8f076d047692627ba57c2bf4e5bd2c207f1f42616182c0fabb16f6d131d94b1d72b0c71a6aa7844cc8fc67ff1ee89b1fad36672bc596a0c1

  • memory/4208-13-0x0000000002190000-0x0000000002191000-memory.dmp

    Filesize

    4KB

  • memory/4208-14-0x00000000024E0000-0x00000000028E0000-memory.dmp

    Filesize

    4.0MB

  • memory/4208-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4796-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4796-1-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/4796-3-0x00000000026D0000-0x0000000002AD0000-memory.dmp

    Filesize

    4.0MB

  • memory/4796-12-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB