Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 06:08

General

  • Target

    7zCon.exe

  • Size

    136KB

  • MD5

    1a5c9a0b812fad2f1037eab0f63ef2ac

  • SHA1

    6a4504605be967641ee742fe26b1b9601d6da7b9

  • SHA256

    3a683bb29cc263b14b015c11f6fee7257962e2e61be3a2d3d1b204e4feb2aedc

  • SHA512

    b69dbf86c955e4a1715bddbadf0fde9518d41d17f4e9e550e7f82c89064183ec7fa02b2a21edb9d58472aa2a93304c1d420b0a26e80e406e7a61a63c4c92118c

  • SSDEEP

    3072:nWc4EeAFEs+hEwZgYyx3pk4y6g6Q6b4u0GhH9y9Y9HrhYLgzY7fNPU:34/M5wZXyx+j6cYhdy9YFtYLgM7lP

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7zCon.exe
    "C:\Users\Admin\AppData\Local\Temp\7zCon.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads