Analysis

  • max time kernel
    149s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 08:12

General

  • Target

    VirusTotalUpload.exe

  • Size

    157KB

  • MD5

    32c2941fa7a646a1a1dda8aa1917004b

  • SHA1

    76df2d94dca1f9c8d9c0169bd1dbf4c99ce71a71

  • SHA256

    9f0e6c3c398f16adce5af7b72fa51b820c1475336761c504a518aab9255762d1

  • SHA512

    9971b5e5772dc8bcbb9dcb955ee528a0bf1e40499796be7e4f76e2ebecd0dfd316fe90567edf0d5b773820fa64fddf40eb4c8e067dc0239627b0134d0de1628a

  • SSDEEP

    3072:zQjLSU6VICKoT2gNMLMME6eHEqPpVNmQwIMZW:zQjLStICPagmLVE6eHRLwB

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusTotalUpload.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusTotalUpload.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads