Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 05:02

General

  • Target

    93b50ca44007e8e7c67b3f017302a72a47dd2fb77162e59486e29a72d4523c8aN.exe

  • Size

    994KB

  • MD5

    2d8430fa683b34a453e9b07affb6e380

  • SHA1

    ccfcb5fd1fe0bc7d24298f51f83fa8a360609eba

  • SHA256

    93b50ca44007e8e7c67b3f017302a72a47dd2fb77162e59486e29a72d4523c8a

  • SHA512

    710c96bd76e14199e4628e3f5bd759873c30d106914567c3bf6f23812168cf0ec140cfd50e23aade9d3d0e6790a3b2f3f85e7de4175fac0c504bde9c827dd8ab

  • SSDEEP

    24576:4MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxx:dJ5gEKNikf3hBfUiWxx

Malware Config

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93b50ca44007e8e7c67b3f017302a72a47dd2fb77162e59486e29a72d4523c8aN.exe
    "C:\Users\Admin\AppData\Local\Temp\93b50ca44007e8e7c67b3f017302a72a47dd2fb77162e59486e29a72d4523c8aN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    994KB

    MD5

    d0598ef0c9c04c97f87cb8d27116bfe0

    SHA1

    31ff047b7934b96d6547b1ad242852a29dfb3d89

    SHA256

    f90023652cefff0c809352c07037daa838d9413f0696963be815520cc236e1a7

    SHA512

    8d73bf47183782963a387da083432a545d25aa3efd67b65b4cd828a7ba215d5d67d5f64352a8dd41ccb9d04270af1e36f9c3510a3c43df05c1727b2ec9c5dd10

  • memory/1220-13-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/1220-14-0x0000000002570000-0x0000000002970000-memory.dmp

    Filesize

    4.0MB

  • memory/1220-21-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4712-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4712-1-0x00000000022E0000-0x00000000022E1000-memory.dmp

    Filesize

    4KB

  • memory/4712-3-0x0000000002700000-0x0000000002B00000-memory.dmp

    Filesize

    4.0MB

  • memory/4712-12-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB