Analysis

  • max time kernel
    158s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    14-02-2022 07:54

General

  • Target

    3d93abd9549f08830e1afad2b07063d3555b282c1a8a5787058e1950bb8286d9.exe

  • Size

    40KB

  • MD5

    9591f1088e1e52df0ca6250523cc5423

  • SHA1

    95af25db65c6960c992b556d6b1c3d9c4fd3d6c1

  • SHA256

    3d93abd9549f08830e1afad2b07063d3555b282c1a8a5787058e1950bb8286d9

  • SHA512

    ba995c9fdbf103919ad797f5efa54c12bf29cfd4755974209964d007232f08c527a6d162ad1b5744297f65260e19a46394ebe26d1830b83867ef8003b1418ae0

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d93abd9549f08830e1afad2b07063d3555b282c1a8a5787058e1950bb8286d9.exe
    "C:\Users\Admin\AppData\Local\Temp\3d93abd9549f08830e1afad2b07063d3555b282c1a8a5787058e1950bb8286d9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:324
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1420
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1420-133-0x000001742EB60000-0x000001742EB70000-memory.dmp

    Filesize

    64KB

  • memory/1420-134-0x000001742F220000-0x000001742F230000-memory.dmp

    Filesize

    64KB

  • memory/1420-135-0x00000174318E0000-0x00000174318E4000-memory.dmp

    Filesize

    16KB

  • memory/4524-130-0x0000000002140000-0x0000000002141000-memory.dmp

    Filesize

    4KB