Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
5d42100abb1ff599c806be3e36979f30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d42100abb1ff599c806be3e36979f30N.exe
Resource
win10v2004-20240802-en
General
-
Target
5d42100abb1ff599c806be3e36979f30N.exe
-
Size
4.0MB
-
MD5
5d42100abb1ff599c806be3e36979f30
-
SHA1
10d6abab51af7ae74d72ab7a34328dcb611ef58f
-
SHA256
da5d2ed0ddcb0a5716741cb60bf0ff269841f78012d09ef017abdb17ab48adfa
-
SHA512
bff663fea4fe3b4d5357f54206b6398d7dc2e1f955000c40f346fc595cfac29b340d4e288685db4501d52d5e220ae2a365107d1a467778fd0e261af85a39cd63
-
SSDEEP
49152:lKKfHPZ6IVMv76K8ocsCGzzJ7UDv7zuBcLAqw1Gjg+A2deCMmwV/iJu2mWG2mrk:l/fh6ImzzJoDfuBcMv+A7aXA
Malware Config
Signatures
-
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.EXE 5d42100abb1ff599c806be3e36979f30N.exe File opened for modification C:\PROGRAM FILES\7-ZIP\UNINSTALL.EXE 5d42100abb1ff599c806be3e36979f30N.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.EXE 5d42100abb1ff599c806be3e36979f30N.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.EXE 5d42100abb1ff599c806be3e36979f30N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d42100abb1ff599c806be3e36979f30N.exe