Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 05:17

General

  • Target

    kyggpnadk.exe

  • Size

    168KB

  • MD5

    5258ea17d00705e2accee3c63e21d7ab

  • SHA1

    ae2d56d597d50bda9dadca39cd71b8488a28682c

  • SHA256

    8e9b30213dcab171d3e65d0da99e4a847da5cba6fc47f3641d90e8d6e70637b6

  • SHA512

    30c68b68b4caa22747bc8312fad4089d5d45e10565f03718d8ce4fdf9d5b53f8e60a9d5ca73fec521437ccf63eb902cc9a5534cafe1ffff7658810e438747e8e

  • SSDEEP

    3072:fc4Horf5X/n8eXZHTFGAfU7VKXHGHggYRdDUbfZm:f3y1/n8YpDCVKXHGAh

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe
    "C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 156
      2⤵
      • Program crash
      PID:804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads