Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 07:57

General

  • Target

    b31262ab3774c24326b070d1a6d451f4b36118f5382d772d598bc078009d7230N.exe

  • Size

    25KB

  • MD5

    43c5b64bf8421ac64c13fe39d8d99120

  • SHA1

    bef3e685ac85addc50a41d36be2c959a3f82cedc

  • SHA256

    b31262ab3774c24326b070d1a6d451f4b36118f5382d772d598bc078009d7230

  • SHA512

    c410679de4ceccb6c8552288e9e699853df55b6f505f906a7b2201024c6b52885f6ab94b61c94bf52040a3b6319f893ab1a6f9c5d3dd35f40a58f6ffd8c5d4b3

  • SSDEEP

    768:jepHpMRuviPuvvaVeRMF71HYN/9sq7isXFHJ:ypHp25wvaVeR071HYV9rFJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b31262ab3774c24326b070d1a6d451f4b36118f5382d772d598bc078009d7230N.exe
    "C:\Users\Admin\AppData\Local\Temp\b31262ab3774c24326b070d1a6d451f4b36118f5382d772d598bc078009d7230N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    25KB

    MD5

    ad10f919bd9f0322e49797334d8d7f90

    SHA1

    39bdcab7d4b7f603b892795eada84ac0ce908696

    SHA256

    7590725e427b39cb9ed888c641834cd1c2fba8decea660ceed9a6690e9d267ec

    SHA512

    e7b0f0226718be06dac4059c9a9dc3ffe6c26a883068fbc86e1457bc5fab8e2cb8ee1084f97ec7289fb0aad787579427665d6eba661f59bf3bcc154fefdc0116

  • memory/2148-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2148-1-0x00000000025D0000-0x00000000025D1000-memory.dmp

    Filesize

    4KB

  • memory/2148-9-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2148-10-0x0000000003050000-0x0000000003450000-memory.dmp

    Filesize

    4.0MB

  • memory/3068-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3068-12-0x0000000002130000-0x0000000002131000-memory.dmp

    Filesize

    4KB

  • memory/3068-14-0x0000000002BF0000-0x0000000002FF0000-memory.dmp

    Filesize

    4.0MB

  • memory/3068-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB