Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 02:14
Static task
static1
Behavioral task
behavioral1
Sample
337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe
Resource
win10v2004-20220414-en
General
-
Target
337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe
-
Size
607KB
-
MD5
6b652b5c7c5224113c295493083800ba
-
SHA1
69c36cc23cf3d07619b548a8dd80d2de260a7171
-
SHA256
337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6
-
SHA512
b85614dd89a94b6dd43f68a83dd17fe922adbd9c3696b3de7ec1bf64cc52459be01d93c24cf31b102e7e33604da9fe3cb0f4de4e91207b6860c2f8adfd2ef597
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2672 szgfw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2672 1928 337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe 80 PID 1928 wrote to memory of 2672 1928 337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe 80 PID 1928 wrote to memory of 2672 1928 337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe"C:\Users\Admin\AppData\Local\Temp\337ab03fe0907ec65570d11d52cfd0e74d3804ca8ec53419ee4a832bb3b47db6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608KB
MD5a2380115e38c05e743b69c8132a27987
SHA1ec4508bfb5dd5dc2cfdc866980a64239fb19bdb7
SHA25658dd16bc67f303729413d2feb8e9044e77c1ea78ebd9d14b7f3b5f88d1ede598
SHA5120c74082bb2eab6c1d9d395bf6824ab8e0a246b010aeff01c2a6c18524a7ab6728afa4843de93e3cca350002f6ea4335a083bdafea9e89fc6b7f82a3de0d7c1ee
-
Filesize
608KB
MD5a2380115e38c05e743b69c8132a27987
SHA1ec4508bfb5dd5dc2cfdc866980a64239fb19bdb7
SHA25658dd16bc67f303729413d2feb8e9044e77c1ea78ebd9d14b7f3b5f88d1ede598
SHA5120c74082bb2eab6c1d9d395bf6824ab8e0a246b010aeff01c2a6c18524a7ab6728afa4843de93e3cca350002f6ea4335a083bdafea9e89fc6b7f82a3de0d7c1ee