Analysis

  • max time kernel
    32s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    21/11/2024, 10:59

General

  • Target

    7zCon.exe

  • Size

    136KB

  • MD5

    2e0e224e634c906a3137ce1a598edba1

  • SHA1

    9ef5f61150f54dc4595a0c8fab60d8c8e48766fa

  • SHA256

    48e3c6a41cceb919614004e1323c36576aef8a7ab958effe0c7c7a765e8f743c

  • SHA512

    e114ae980abd0058c5a1fe3c7f0fcead4e3fe1c5f2e67a6cd66ad8deca6bb9daeed06a19489151182d7c4209105235165c65f5c956689e63e70d32ef8776fcee

  • SSDEEP

    3072:UFzjcFuLNaq8ux26HOskTyikxjs6bME14o04bwbthOdFg1IYB7PdU2:UFZBaq8uU6Hg+iOjjMUkphOdeOq7lU

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7zCon.exe
    "C:\Users\Admin\AppData\Local\Temp\7zCon.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads