Analysis
-
max time kernel
111s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
ecbb1f01168bbe00fcee8ef1cf986e00N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecbb1f01168bbe00fcee8ef1cf986e00N.exe
Resource
win10v2004-20240802-en
General
-
Target
ecbb1f01168bbe00fcee8ef1cf986e00N.exe
-
Size
23KB
-
MD5
ecbb1f01168bbe00fcee8ef1cf986e00
-
SHA1
a5057d7499849058a2861371d25ef4e7f89ca7df
-
SHA256
258a6228c1c820c9c6994605192bef5644f7b93a6e4371e6d7af731b5d53a026
-
SHA512
d371e339344e42337f270e5f57e25208883c72a05cbc3da4dd9999f4e447e76584feebc050d3046e12f9657d571e3ef1308fa0e62a99d13be1b08657e615c7b4
-
SSDEEP
384:bAmt53ZsCQ4P+GhplI+22rL7bJ0qLPXa0w1X+jv9LLaPaoE/do:bJHsCJ+Ghg+22rL7bJ0qLPXa0NjF5JW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation ecbb1f01168bbe00fcee8ef1cf986e00N.exe -
Executes dropped EXE 1 IoCs
pid Process 4208 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecbb1f01168bbe00fcee8ef1cf986e00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4208 4796 ecbb1f01168bbe00fcee8ef1cf986e00N.exe 85 PID 4796 wrote to memory of 4208 4796 ecbb1f01168bbe00fcee8ef1cf986e00N.exe 85 PID 4796 wrote to memory of 4208 4796 ecbb1f01168bbe00fcee8ef1cf986e00N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecbb1f01168bbe00fcee8ef1cf986e00N.exe"C:\Users\Admin\AppData\Local\Temp\ecbb1f01168bbe00fcee8ef1cf986e00N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD518bc42885415f9d4b7d543082e0a69b9
SHA1035b2fb4c7885ae39872c41fa3dd32d20cfb1d39
SHA256e0d605453ebbe624d03209fb2b508e9a85b12733f4bf5e7cdebdddae33eed5d5
SHA512014db370d272a20f8f076d047692627ba57c2bf4e5bd2c207f1f42616182c0fabb16f6d131d94b1d72b0c71a6aa7844cc8fc67ff1ee89b1fad36672bc596a0c1