Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 00:09
Behavioral task
behavioral1
Sample
c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe
Resource
win10v2004-20241007-en
General
-
Target
c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe
-
Size
975KB
-
MD5
0288f9c0888497631d0d7631252d92e0
-
SHA1
b5d99af3de69fca8cef10339cf5e3e4f3ee1269f
-
SHA256
c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450c
-
SHA512
30383cf1bc795f7335be6b301a5c58c60de36f6d1822e2ea152b5a2198093d7d7dd2f38684db1de30db90fad6ed742b8f117b2564f8e46df89849666197285b8
-
SSDEEP
24576:eMjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxN:bJ5gEKNikf3hBfUiWxN
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023bc4-7.dat family_ammyyadmin -
Ammyyadmin family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language budha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2036 4952 c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe 82 PID 4952 wrote to memory of 2036 4952 c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe 82 PID 4952 wrote to memory of 2036 4952 c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe"C:\Users\Admin\AppData\Local\Temp\c9470886cc3627f16352061cffc6ce8f1f7bc5b546b7c7ae715de5a33ed7450cN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
975KB
MD59f6aa0ddba359693035cdf114b3aabc4
SHA10a67fe3b8aefa733c49471b37458f9ba4583cbc8
SHA256c9c758fb2f6ac41ca4d8a03f4606fe6e26671315fe2da028540944b167a6150c
SHA512002ebbd2bf67a0d3fece14ce515f394f0d772498ae71790b9f4e5726b4d9b803a2b48a665ce1d456e07ac2ae7a1c132d869ad1f5c9b99da9c25992b5abf2dec0