Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 11:38 UTC

General

  • Target

    26d5429985cde0b775cc2bae0daf4fa62f98fce760527ff06301bee4d7389861N.exe

  • Size

    300KB

  • MD5

    8ad377ef3424df57291651772c4f5dc0

  • SHA1

    1c71eb72c11b07c18e6fb88ce938fd683464ca76

  • SHA256

    26d5429985cde0b775cc2bae0daf4fa62f98fce760527ff06301bee4d7389861

  • SHA512

    10d252d794e6c4c0f0c0fd46da6589906fcc05d2a75ba9a6db984e9b03ad07174d49462da3d41b91fe07691c8dedd2da56a1edbf6be0e3a1d53f92a7c42eb5d6

  • SSDEEP

    3072:IgXdZt9P6DvXJ7B5ANYu4tTB/GvCaZ/NwYu4tTB/wvCaZ/Vm5QdaUqf8x++bVo5N:Ie3A+NYfI6glwYfS6g9iiaUqitiq5WF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\26d5429985cde0b775cc2bae0daf4fa62f98fce760527ff06301bee4d7389861N.exe
    "C:\Users\Admin\AppData\Local\Temp\26d5429985cde0b775cc2bae0daf4fa62f98fce760527ff06301bee4d7389861N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.