Analysis
-
max time kernel
99s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe
Resource
win10v2004-20240802-en
General
-
Target
09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe
-
Size
44KB
-
MD5
aba567e8e110913e7af66601e97d7237
-
SHA1
4626f15edd0f66ab7ae24ecc85bbae803c2132ff
-
SHA256
09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc
-
SHA512
b3e48d951b937d087294c45b2ca619dbf52cf58f88c0d5229ee5949c1a42fac27facf4bcbada34127bf74f7a1ced7f498fa4d82a65480e9e1b389a2107dd89d4
-
SSDEEP
384:EACDQL/TQfYjQXoHyglpIK0KYTA6QXEVvYpMlQYpxlqiq8sSKpEqcyzU:EXQLGCQYHyY6gX8v+slxa4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe -
Executes dropped EXE 1 IoCs
pid Process 3472 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 3472 1572 09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe 85 PID 1572 wrote to memory of 3472 1572 09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe 85 PID 1572 wrote to memory of 3472 1572 09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe"C:\Users\Admin\AppData\Local\Temp\09a1a297ab09fc94543352cf378f095d446ddd8c6a5a04a5c277c4bf41b979fc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5a120f59aadaeade55a566348161bdf0c
SHA19016e71ff40e61f4cd28f06fe8b558c50815451e
SHA256b41aef39006aa61c67cf35ed13a6b14108218fe6d53ff71c6651f98b11f8dd68
SHA5127c0580f4fa0117d4516ea14fd38483f16862f94f9a414826675ff0a78b12aab07c761b8ee99a87164433fde9ebc76281a16b2126d44205585f80862808a62c2e