Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 14:17

General

  • Target

    26b22485d37d50aba70900fbbfccae85e320fad07a10f87be0d40b2a4ff27cdc.exe

  • Size

    909KB

  • MD5

    c6ab0e89786d623e9bae194463c4adf6

  • SHA1

    19a9bcf0182a50f0a247830c80cbcd8a85e56c07

  • SHA256

    26b22485d37d50aba70900fbbfccae85e320fad07a10f87be0d40b2a4ff27cdc

  • SHA512

    d5edf63b2aabd3055f14da964fc6069c1801fb4cb6c48cf935875a5448e7569aec14416a456d64b48c7f12f1d17ce2243312b54a633d0b9b9398ae87e1fbf3ae

  • SSDEEP

    24576:yjJoOks+fMEVbi7NOdUOnDnRGjzCl+OwITha4pGB986qZUs:yGro7NOdUODnj+OwITwxX86qZUs

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26b22485d37d50aba70900fbbfccae85e320fad07a10f87be0d40b2a4ff27cdc.exe
    "C:\Users\Admin\AppData\Local\Temp\26b22485d37d50aba70900fbbfccae85e320fad07a10f87be0d40b2a4ff27cdc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads