Analysis

  • max time kernel
    34s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    21/11/2024, 10:59

General

  • Target

    7z.exe

  • Size

    146KB

  • MD5

    6c6f5790a3fcd3b6eeb89357dcf8ffbc

  • SHA1

    0405cac36810dda5b1e20a9249e211b43639b10c

  • SHA256

    9ad3715b28bd48ec64a9e6e8e49aa0da5784e176b7de501cf26a7dad96e72f2c

  • SHA512

    f8cc63a2e7f972a0b07e869e9c83b2a3baa6020a3e684ccd33f6fb6851af0711ae49b2909cccdc1b5f8b57b9ba2123abd1a9432f5864acc898260e5d81e17431

  • SSDEEP

    3072:X1tsuh7N9aBlz9HmsSy5XXDMAejb4iBHE7a2rpk+:X1tHhbavz9Ky5XXDOHjk7Ny

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7z.exe
    "C:\Users\Admin\AppData\Local\Temp\7z.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads