Analysis
-
max time kernel
93s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
59b15813a897a17f31e75fb11f37e3a0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59b15813a897a17f31e75fb11f37e3a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
59b15813a897a17f31e75fb11f37e3a0N.exe
-
Size
10KB
-
MD5
59b15813a897a17f31e75fb11f37e3a0
-
SHA1
b14310bc6493d1445fb7ed0348fb5e38a4920041
-
SHA256
3bb58d37470f8b8f696c56ff46bcb554ef0263aea4c4416077f45c95579550c6
-
SHA512
f67cc575ec7d28972d0025cc8622db0a4f58b0b4cfefa3816d57670d9b9b3a30d0f9bd5210b50cc45a3333375570743bed059067395893b2f32751e1c0e76351
-
SSDEEP
192:Hym8TSrQWRIc+v2StX17jNkwc1Cqy/gYC:HxEsQWRIc8ttX17iwc1y/9C
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 59b15813a897a17f31e75fb11f37e3a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4424 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59b15813a897a17f31e75fb11f37e3a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4424 3092 59b15813a897a17f31e75fb11f37e3a0N.exe 84 PID 3092 wrote to memory of 4424 3092 59b15813a897a17f31e75fb11f37e3a0N.exe 84 PID 3092 wrote to memory of 4424 3092 59b15813a897a17f31e75fb11f37e3a0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b15813a897a17f31e75fb11f37e3a0N.exe"C:\Users\Admin\AppData\Local\Temp\59b15813a897a17f31e75fb11f37e3a0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD523731ba4c16c823d048ce4faf3deeb09
SHA11335c97f918a7eb9bc421a0bc7ce1df5eac30793
SHA2569f08ad69640bb2b92146148b20ea80e4a10de05bd67c3c509252e819049a76ab
SHA512b870e794bfb49198df6ccc35bc7996ad307ea7311f862305a2fb4076b7103af8c772e5b6b822a8c1f5a74d395169e20d026f43410e3b870a3e5a9900fd0a80b2