Analysis
-
max time kernel
163s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 19:40
Static task
static1
Behavioral task
behavioral1
Sample
444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe
Resource
win10v2004-20220414-en
General
-
Target
444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe
-
Size
43KB
-
MD5
aa9eb138d6dbfde3ebdcfa12e7091fd9
-
SHA1
53234d0169170feaa9347b0dbbd4a6fff2addec4
-
SHA256
444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5
-
SHA512
339aee202640fc4851e443c58f3d825a9022bf96f343d4f52c92722a7bcb7c07726a532dd1977fb7c59976d1554752ea4cff6b184c88f19a27d89248d03bf741
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 4228 szgfw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1380 wrote to memory of 4228 1380 444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe 80 PID 1380 wrote to memory of 4228 1380 444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe 80 PID 1380 wrote to memory of 4228 1380 444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe"C:\Users\Admin\AppData\Local\Temp\444f8a0f7f579bd80e89a546cdfb8dd3dd1a1b280ddde5c01165cba55d7575b5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD58fe98034515bee4b8982a382a745a9fb
SHA181cecb41c757bc5c026574a3550e0e31e71464f0
SHA256543d5899249ad81ffa11e123a0d635a8fc4c38c0c915302d91f667feda8f6515
SHA51233e3126e3601db91781cade6310585e210dff849e412391b22f8dd99f7039580bbfe6c40b79a91a052bc84d5e5f3c12c67912c770c9a5d36435cf1915698e7c0
-
Filesize
43KB
MD58fe98034515bee4b8982a382a745a9fb
SHA181cecb41c757bc5c026574a3550e0e31e71464f0
SHA256543d5899249ad81ffa11e123a0d635a8fc4c38c0c915302d91f667feda8f6515
SHA51233e3126e3601db91781cade6310585e210dff849e412391b22f8dd99f7039580bbfe6c40b79a91a052bc84d5e5f3c12c67912c770c9a5d36435cf1915698e7c0