Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kyggpnadk.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
kyggpnadk.exe
Resource
win10v2004-20241007-en
General
-
Target
5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe
-
Size
315KB
-
MD5
d51f1d0cfd3d340217a10563e26b874b
-
SHA1
7a0208d13ecf6943af12a9f49b1f66b10d3ebeda
-
SHA256
5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1
-
SHA512
53a440e7b2d450c15fc340a79f586c7d6021ddd3adffe8af9ec9cd54b301749abfd10184d784cd2dea6a0595576cbe7526d4c7de838f2c183c297e90285e7f77
-
SSDEEP
6144:TxDZ+uY3Vi2Ad8nC3aXrPvT0b663EFC7TY6aU3DaQuwgTNN1rxf:z/acTdf3E5dUvYjU3uLw+rN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 540 kyggpnadk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2016 540 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kyggpnadk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1152 wrote to memory of 540 1152 5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe 83 PID 1152 wrote to memory of 540 1152 5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe 83 PID 1152 wrote to memory of 540 1152 5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe 83 PID 540 wrote to memory of 2196 540 kyggpnadk.exe 84 PID 540 wrote to memory of 2196 540 kyggpnadk.exe 84 PID 540 wrote to memory of 2196 540 kyggpnadk.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe"C:\Users\Admin\AppData\Local\Temp\5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exeC:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe C:\Users\Admin\AppData\Local\Temp\kabuheez2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exeC:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe C:\Users\Admin\AppData\Local\Temp\kabuheez3⤵PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 5323⤵
- Program crash
PID:2016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 540 -ip 5401⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f4e69538b872c4a0005275ccd06b88b2
SHA163a4a19da4aa83a1f040d1e0e6ea7c1a67ed84f3
SHA2565bc9e2ec5f966541bc3c52d12c305e3955833b2caf7ac4e1645f0e58c45f716b
SHA51232d56b218dbfffe275fb961731bea31cd3893125ff0ea3a5e93321ece3b7575f2f959e0771b709238b32ceb4668b628640e043f16a96ab989577bada0992d61f
-
Filesize
168KB
MD55258ea17d00705e2accee3c63e21d7ab
SHA1ae2d56d597d50bda9dadca39cd71b8488a28682c
SHA2568e9b30213dcab171d3e65d0da99e4a847da5cba6fc47f3641d90e8d6e70637b6
SHA51230c68b68b4caa22747bc8312fad4089d5d45e10565f03718d8ce4fdf9d5b53f8e60a9d5ca73fec521437ccf63eb902cc9a5534cafe1ffff7658810e438747e8e
-
Filesize
212KB
MD5bda3c190a54ea571844e1ad4e2d41eb6
SHA1a14c828399fed12a07b621f3a6c3f54799763219
SHA256650af1d156699b93a193e5f719028f9ede7c7c2685f8f04714d936dc74d91080
SHA5126b9845370155e9f4e1a15c208ab78b5d7eed6dab4e257717adb34b45c473fdab3b34c0c91b1dc0c20edb889d01c5e6e4c4ae48d1b3ebc1e03be447117dd35145