Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 03:36

General

  • Target

    dd55fb05f6fd9e069265a665c8e79f8eec27b50c6f9ae793bb28105a55f81a62.exe

  • Size

    4KB

  • MD5

    3ffa2b51c80e07ae56bcd4820aac371f

  • SHA1

    c9eb3b825a5c267a388c120ad57fd86446243813

  • SHA256

    dd55fb05f6fd9e069265a665c8e79f8eec27b50c6f9ae793bb28105a55f81a62

  • SHA512

    1e706e50c306d90da6071bd5e9ac1b3cf1470a7eaf5bb1382c355dde8a25d1101a751867ac14b92591c5f827ccd2c560830d23f252d6b8a2ff72d9d07a982d79

  • SSDEEP

    96:Z0v4mUWKh9ctgC1RMJOnKymV44ShylyzUA3:9mUWKs/JnKfzShyLA3

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd55fb05f6fd9e069265a665c8e79f8eec27b50c6f9ae793bb28105a55f81a62.exe
    "C:\Users\Admin\AppData\Local\Temp\dd55fb05f6fd9e069265a665c8e79f8eec27b50c6f9ae793bb28105a55f81a62.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:4224
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4232,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:8
    1⤵
      PID:4752

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      Filesize

      4KB

      MD5

      ce1c0ef78e285de57e22ec87d9d566b0

      SHA1

      4f64d9457b2ceff78952c7833ecdcf3b4a7bc857

      SHA256

      6d1477cbdaa568f9b0d8e514b2db49e04076d454db4eab5b0f7911bcb02c7c84

      SHA512

      afb309df81e58ccf75de5c10f75fd37e8ded726fe28c43fc1432e1b74ab837281f353511c596ecf89dfef273625008972251a34d7d08490b51feb4403ad4ab26