Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 18:25
Behavioral task
behavioral1
Sample
2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe
Resource
win10v2004-20240802-en
General
-
Target
2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe
-
Size
994KB
-
MD5
622f608a0b8fc465dbc769dc55e8fff0
-
SHA1
f4d839a7b5d62727de46d8ac223cc8d25383c6db
-
SHA256
2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760d
-
SHA512
45bd727340c717667639a03972c72f8b07e28d36091f18ab909b74da7fb0172c49a0d8e949a50f735b3d466745ce0ab8e08cf12b5a07e613c3502d6f4ffab79a
-
SSDEEP
24576:rMjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxy:mJ5gEKNikf3hBfUiWxy
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023477-7.dat family_ammyyadmin -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 budha.exe -
resource yara_rule behavioral2/memory/388-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0008000000023477-7.dat upx behavioral2/memory/388-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/2388-23-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 388 wrote to memory of 2388 388 2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe 82 PID 388 wrote to memory of 2388 388 2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe 82 PID 388 wrote to memory of 2388 388 2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe"C:\Users\Admin\AppData\Local\Temp\2778946330f34cef4f02552dee7a326fe9d146b53316cabb32df8a838f48760dN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
995KB
MD58b02dc530a9accf5c1291d32f0c4e9b7
SHA11544b1dc1071e30d549e44e63a6d505be8ba2f02
SHA2565185c91eb4a002362a08e6b097b2c31a4849381bed4673b2172b2ab369a8eac0
SHA512119721b54964610803ff01279fd5e6d664dffe36a5c4d480faaab820a2b19a4a612b877ff5fd09407ae176d22e40b7f9f8e5c20fcbd184bf0834ece2f32b640a