Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 05:17

General

  • Target

    5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe

  • Size

    315KB

  • MD5

    d51f1d0cfd3d340217a10563e26b874b

  • SHA1

    7a0208d13ecf6943af12a9f49b1f66b10d3ebeda

  • SHA256

    5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1

  • SHA512

    53a440e7b2d450c15fc340a79f586c7d6021ddd3adffe8af9ec9cd54b301749abfd10184d784cd2dea6a0595576cbe7526d4c7de838f2c183c297e90285e7f77

  • SSDEEP

    6144:TxDZ+uY3Vi2Ad8nC3aXrPvT0b663EFC7TY6aU3DaQuwgTNN1rxf:z/acTdf3E5dUvYjU3uLw+rN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe
    "C:\Users\Admin\AppData\Local\Temp\5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe
      C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe C:\Users\Admin\AppData\Local\Temp\kabuheez
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe
        C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe C:\Users\Admin\AppData\Local\Temp\kabuheez
        3⤵
          PID:2196
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 532
          3⤵
          • Program crash
          PID:2016
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 540 -ip 540
      1⤵
        PID:3540

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\kabuheez

        Filesize

        4KB

        MD5

        f4e69538b872c4a0005275ccd06b88b2

        SHA1

        63a4a19da4aa83a1f040d1e0e6ea7c1a67ed84f3

        SHA256

        5bc9e2ec5f966541bc3c52d12c305e3955833b2caf7ac4e1645f0e58c45f716b

        SHA512

        32d56b218dbfffe275fb961731bea31cd3893125ff0ea3a5e93321ece3b7575f2f959e0771b709238b32ceb4668b628640e043f16a96ab989577bada0992d61f

      • C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe

        Filesize

        168KB

        MD5

        5258ea17d00705e2accee3c63e21d7ab

        SHA1

        ae2d56d597d50bda9dadca39cd71b8488a28682c

        SHA256

        8e9b30213dcab171d3e65d0da99e4a847da5cba6fc47f3641d90e8d6e70637b6

        SHA512

        30c68b68b4caa22747bc8312fad4089d5d45e10565f03718d8ce4fdf9d5b53f8e60a9d5ca73fec521437ccf63eb902cc9a5534cafe1ffff7658810e438747e8e

      • C:\Users\Admin\AppData\Local\Temp\mjr8sde7g4e

        Filesize

        212KB

        MD5

        bda3c190a54ea571844e1ad4e2d41eb6

        SHA1

        a14c828399fed12a07b621f3a6c3f54799763219

        SHA256

        650af1d156699b93a193e5f719028f9ede7c7c2685f8f04714d936dc74d91080

        SHA512

        6b9845370155e9f4e1a15c208ab78b5d7eed6dab4e257717adb34b45c473fdab3b34c0c91b1dc0c20edb889d01c5e6e4c4ae48d1b3ebc1e03be447117dd35145

      • memory/540-8-0x00000000005F0000-0x00000000005F2000-memory.dmp

        Filesize

        8KB