Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2022 21:10

General

  • Target

    ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe

  • Size

    8KB

  • MD5

    bf84c88e9799da266f64b145ed624a96

  • SHA1

    944f58671ff9da706129e2009723340ba266136e

  • SHA256

    ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f

  • SHA512

    13fb049097550b722d58445f8c29cff5da6f5765e469ffe84db78ba094f8bca595537cd53d21b118633f272b6b4bb80a9ac7aef163c396b23d0f12b0ffc54899

  • SSDEEP

    192:9mUWKs/nLnKfzSh2U95Qd96rD5IuEvI4fcii:6K+zKfzQz9v5jGnch

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3196
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:652

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
    Filesize

    8KB

    MD5

    5cf62b1c775cb0e743ac26b8e9657895

    SHA1

    270d41596578cb42a2b563cb9d8e89a6b9340fdd

    SHA256

    aab8c03a6e03b9c4456e5125c49847ce4c93c1e16e7b5b29aa1aeea8af17ab25

    SHA512

    2c21bf4e4128a4da1cc791ce5a63ee9f5bf15877b0179dcc11e26439168edb39fc6ff37a19104db8e02407d3da191928add8717c896c3df800396090c4c94ddf

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
    Filesize

    8KB

    MD5

    5cf62b1c775cb0e743ac26b8e9657895

    SHA1

    270d41596578cb42a2b563cb9d8e89a6b9340fdd

    SHA256

    aab8c03a6e03b9c4456e5125c49847ce4c93c1e16e7b5b29aa1aeea8af17ab25

    SHA512

    2c21bf4e4128a4da1cc791ce5a63ee9f5bf15877b0179dcc11e26439168edb39fc6ff37a19104db8e02407d3da191928add8717c896c3df800396090c4c94ddf

  • memory/652-132-0x0000000000000000-mapping.dmp