Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 23:54

General

  • Target

    85e6db3894fb7651e76abb0671ef73cf79bc84d6b3822a4ea4f4383212353bc2.exe

  • Size

    976KB

  • MD5

    ca098378b9bccd0c6c974d4007f10e92

  • SHA1

    b34e7e690fc79af173acf4cb4e2ad7b2deedd28a

  • SHA256

    85e6db3894fb7651e76abb0671ef73cf79bc84d6b3822a4ea4f4383212353bc2

  • SHA512

    ceb1336e40eed4fe458d24472723f932eac82a7c5e5d9809e9756e284180c5712e3717d0fe0637f72526c0cb7eacb70597ee34392a3a05a6fa9b8e32e6d7a27c

  • SSDEEP

    24576:eMjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxe:bJ5gEKNikf3hBfUiWxe

Malware Config

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin payload 1 IoCs
  • Ammyyadmin family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85e6db3894fb7651e76abb0671ef73cf79bc84d6b3822a4ea4f4383212353bc2.exe
    "C:\Users\Admin\AppData\Local\Temp\85e6db3894fb7651e76abb0671ef73cf79bc84d6b3822a4ea4f4383212353bc2.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    976KB

    MD5

    bd646fed0926e03d74a831a433485caf

    SHA1

    311551923c770e92c595714824a790b49f3fa0bb

    SHA256

    24b84f60e054fea244b1a84f2f38243b2c37282cea363c0b8b7966c0e4148e92

    SHA512

    d82b74af731b7c73870987337856a056226a728ebe88af355dabc7b85c369a7fb18cfcfe5c9119145240be27f08589b96accab9a6a14868167fbecda223b44ad

  • memory/1348-13-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/1348-14-0x0000000002620000-0x0000000002A20000-memory.dmp

    Filesize

    4.0MB

  • memory/1348-21-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3460-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3460-1-0x00000000021C0000-0x00000000021C1000-memory.dmp

    Filesize

    4KB

  • memory/3460-3-0x0000000002710000-0x0000000002B10000-memory.dmp

    Filesize

    4.0MB

  • memory/3460-12-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB