Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 19:27

General

  • Target

    2083be401e779287188c1796caa98b4357422dbd2a43e51a3e0db01f1b371492.exe

  • Size

    69KB

  • MD5

    a69cd997b79bfb2bed46aad53f3c9c18

  • SHA1

    c3abcec3862c6d2ace691353b1adfa1f81473563

  • SHA256

    2083be401e779287188c1796caa98b4357422dbd2a43e51a3e0db01f1b371492

  • SHA512

    ffcba64f5ba72cea6bf7e37713bb69cb92b8d0dda7de5c6d2af891e79aee307fafda9fcda706c06e40d9a1fc94ddefca001d3b8564c16429460aa220deb06ce7

  • SSDEEP

    1536:5Y9jw/dUT62rGdiUOWWrMffJ+AxM+I+ceWgP/KmVQ3:5Y9CUT62/UOVMffJ+AW+I+cT

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2083be401e779287188c1796caa98b4357422dbd2a43e51a3e0db01f1b371492.exe
    "C:\Users\Admin\AppData\Local\Temp\2083be401e779287188c1796caa98b4357422dbd2a43e51a3e0db01f1b371492.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:5048

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
    Filesize

    69KB

    MD5

    f763864638d3adae01842b9c936fce2e

    SHA1

    9aa7f5b4e74cf6d6bf2133a8402742bba6837ca0

    SHA256

    851e2df4bae897ddaa6469cf7d13f21f7f7bf5da4e7133b1a3eae30d5d2667c2

    SHA512

    9d99b2e2eacc2f42ea112d93a378a64f0d5e7d5a7be15012ba75e4e18904ed9f2c978964715a442478b567e380226a2a10d2c40004eb7064372a772475b0f06f

  • memory/1536-1-0x0000000000680000-0x0000000000681000-memory.dmp
    Filesize

    4KB

  • memory/1536-9-0x0000000000400000-0x0000000000413000-memory.dmp
    Filesize

    76KB

  • memory/5048-10-0x0000000000400000-0x0000000000413000-memory.dmp
    Filesize

    76KB