Analysis
-
max time kernel
10s -
max time network
2s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2022 13:44
Static task
static1
Behavioral task
behavioral1
Sample
9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe
Resource
win10v2004-20220812-en
General
-
Target
9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe
-
Size
34KB
-
MD5
b5f484312c0d6aa92f1c06f1694800b4
-
SHA1
6997bce7000cf7bbc8cedcd758ba4ef6011123f5
-
SHA256
9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14
-
SHA512
c4a4af5c45fc9bdbf057bc5525ab2d420a65a34c8f7218e80d7cc5bf6c503e19b08f3b99bbe094594b09e58c80b16aa930743b41b2ed5f72b94ade91052bafbf
-
SSDEEP
768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rCBsPGTLKu:GY9jw/dUT62rGdiUOWWrC6P6Wu
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 3628 szgfw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3628 2876 9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe 77 PID 2876 wrote to memory of 3628 2876 9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe 77 PID 2876 wrote to memory of 3628 2876 9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe"C:\Users\Admin\AppData\Local\Temp\9f571e2ca8f5a9dc2c90551690625bae28a6e8f52dcbaae93e01efaa34828e14.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:3628
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD53774fabdf2b708ad58e93951403e57a0
SHA1a56efa3b0e95184aa72d6a1554ceae75ce5ddea8
SHA256f01830158d12c678aeff0b3067398fbf7f1b2af723ebddc08084d63ed6bb2a4b
SHA5129d85568c73c92693f1b4521467e6013bf9f0651fa8ff076b1af75f5f716ceade34113bd4b548d16ef8dd49439c0ae584e982e305697b63ac8918a78f14cbea96
-
Filesize
34KB
MD53774fabdf2b708ad58e93951403e57a0
SHA1a56efa3b0e95184aa72d6a1554ceae75ce5ddea8
SHA256f01830158d12c678aeff0b3067398fbf7f1b2af723ebddc08084d63ed6bb2a4b
SHA5129d85568c73c92693f1b4521467e6013bf9f0651fa8ff076b1af75f5f716ceade34113bd4b548d16ef8dd49439c0ae584e982e305697b63ac8918a78f14cbea96