Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 17:10

General

  • Target

    26cbfd3bd15af9ea17d412b0c844ea0b612daa4c1df86f59f96437d62a348ac3.exe

  • Size

    4.8MB

  • MD5

    023a6a2fcd387fb9b6a3412f968fe167

  • SHA1

    9b858f357c73500e5f7416b2601ac8bf1eb8009a

  • SHA256

    26cbfd3bd15af9ea17d412b0c844ea0b612daa4c1df86f59f96437d62a348ac3

  • SHA512

    7f47b2f0cab6e616d58c3f6815ffb8624ad99bf110a68293ac8c6e627e1e18dc99087be889057de53015f762d65009465743d977ddfc09f7530bb41e5fad5b5a

  • SSDEEP

    98304:ComRTpoQB4MBuySrBqf4Y99ca17ZHDjmP38xkt4OqoYXYzBFuDt3v:WRBJuygY9KItGPsxkSh5XY1FuB3v

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26cbfd3bd15af9ea17d412b0c844ea0b612daa4c1df86f59f96437d62a348ac3.exe
    "C:\Users\Admin\AppData\Local\Temp\26cbfd3bd15af9ea17d412b0c844ea0b612daa4c1df86f59f96437d62a348ac3.exe"
    1⤵
    • Enumerates connected drives
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/612-1-0x0000000000400000-0x0000000000F25000-memory.dmp

    Filesize

    11.1MB

  • memory/612-0-0x0000000000400000-0x0000000000F25000-memory.dmp

    Filesize

    11.1MB

  • memory/612-2-0x0000000000400000-0x0000000000F25000-memory.dmp

    Filesize

    11.1MB

  • memory/612-3-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/612-4-0x00000000037E0000-0x0000000003897000-memory.dmp

    Filesize

    732KB

  • memory/612-5-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/612-6-0x00000000037E0000-0x0000000003897000-memory.dmp

    Filesize

    732KB