Analysis

  • max time kernel
    1379s
  • max time network
    1439s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-uk
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-uklocale:uk-uaos:windows10-ltsc 2021-x64systemwindows
  • submitted
    21-11-2024 07:51

General

  • Target

    7zG.exe

  • Size

    206KB

  • MD5

    8b7bbca8f257999d0401d8836f4e85a9

  • SHA1

    7607f94c7d9adb3dc6c49cb0fbf913c4e2c26a3c

  • SHA256

    c2c5db333c4336be63934c48e5a934b3d0d6d548de76bcdbf0911029a7152f81

  • SHA512

    6f44061b4f85e633bd37e8622f818164f36cd04d99dfa7ac7c29753dd3d9bc4545a7d5da1da9246cc59979871b42af387ebe6befff4e7754e83fc5234dcfd212

  • SSDEEP

    6144:ChyQYxhgSj9uGcsx2V7rJmG7Jji+H/uKU:C8QYx9jdcsx2BrJJ7Nhe

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7zG.exe
    "C:\Users\Admin\AppData\Local\Temp\7zG.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads