Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 12:40

General

  • Target

    d8829f7135eba7a5c35870333582733a5a586d354a82490b69bf1e772118dc5eN.exe

  • Size

    1013KB

  • MD5

    d64b1982a74b76baff2ea716f543c250

  • SHA1

    c7cb1c0b7686def8168f42af3cd7a9ce526a0372

  • SHA256

    d8829f7135eba7a5c35870333582733a5a586d354a82490b69bf1e772118dc5e

  • SHA512

    b504b363c952221317365f52a72875c2b4b3eba0d12e23e311595eb8917c359369da23a49511cab919a8f2363219e7dc69c100d496cb0f3323d2df4065fd4e54

  • SSDEEP

    24576:+MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxc:7J5gEKNikf3hBfUiWxc

Malware Config

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8829f7135eba7a5c35870333582733a5a586d354a82490b69bf1e772118dc5eN.exe
    "C:\Users\Admin\AppData\Local\Temp\d8829f7135eba7a5c35870333582733a5a586d354a82490b69bf1e772118dc5eN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    1013KB

    MD5

    ee3b582d0417f60ae2c5e4e528e7f933

    SHA1

    5e5835b4fac48e13e737357b3666ae8e80a62e9d

    SHA256

    7de886032660d9144c47904340553c573ddd81edc13e60b3f2e7c47b0e43090b

    SHA512

    1dad8c6de72df0afa2fd4f07bfc51e5a830f2f7a23c2ee1180d80042b267f38778704bddd22227088d7a2c9c306d1f777b1e839cf224b72d585fa962b11cc690

  • memory/912-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/912-1-0x0000000002140000-0x0000000002141000-memory.dmp

    Filesize

    4KB

  • memory/912-3-0x00000000025B0000-0x00000000029B0000-memory.dmp

    Filesize

    4.0MB

  • memory/912-11-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1424-13-0x0000000002580000-0x0000000002980000-memory.dmp

    Filesize

    4.0MB

  • memory/1424-12-0x0000000001F60000-0x0000000001F61000-memory.dmp

    Filesize

    4KB

  • memory/1424-20-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB