Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe
Resource
win10v2004-20241007-en
General
-
Target
df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe
-
Size
22KB
-
MD5
da8c035cda6aa081d2e102ed080b45ac
-
SHA1
bb1b06332d383af229c73f65f8fd2a07b390fb59
-
SHA256
df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49
-
SHA512
ece4e087ffa9cff49695543c3c1d1a24a65789d2fb9f512d21df38557fbffe090bce401ac208f54bb73cebf5eea66b4e32eaa580b6d63fedd780181be72b5723
-
SSDEEP
384:twPmgHNs0HDT2rLEqYFa9CEacNRF4qCG66nVPaRAQF:uPHGuSrB0EakzhCG617F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2608 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2564 df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2608 2564 df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe 30 PID 2564 wrote to memory of 2608 2564 df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe 30 PID 2564 wrote to memory of 2608 2564 df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe 30 PID 2564 wrote to memory of 2608 2564 df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe"C:\Users\Admin\AppData\Local\Temp\df85f7f830dc3f0a2834eeb1e18847fc1ce463051e4f1e48e644a61527473e49.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD534e002ce318b7772701e9b0a309e7c38
SHA1585192485fd40d16b0f9edc5338da423ea2f33e7
SHA256f0f05b55f0b7dc7b720009105175d7aa1eee83186585608bb080f0ee9c9ab787
SHA51260c8f39cbcff937bc4d8d4c4e4055534a849b4c883853c69b5925f0bcd16afb1ecc4992a0506962c0883f0c8177143d52e2c7bd292d781c4828b346d453be38f