Analysis

  • max time kernel
    11s
  • max time network
    19s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2022 17:39

General

  • Target

    aed315f427c4102751c24e1b9c9d7af54347a35f093f44749f5a06fc9a9ce023.exe

  • Size

    33KB

  • MD5

    9119833763c0434c1d5961afc179cfe2

  • SHA1

    86a07848362e454878747e9bbdf5fd1842ec79ec

  • SHA256

    aed315f427c4102751c24e1b9c9d7af54347a35f093f44749f5a06fc9a9ce023

  • SHA512

    f3bd5a906d380691723f18b2e7c14284bf1339c6c6d5de69a6009560130669098eb1364aa521fcf571309bc85a79ca92563e7fcb0bee4e55e067a0d87f77f4d3

  • SSDEEP

    768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rh95kyq0VU:GY9jw/dUT62rGdiUOWWrNTU

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aed315f427c4102751c24e1b9c9d7af54347a35f093f44749f5a06fc9a9ce023.exe
    "C:\Users\Admin\AppData\Local\Temp\aed315f427c4102751c24e1b9c9d7af54347a35f093f44749f5a06fc9a9ce023.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:1440

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
    Filesize

    33KB

    MD5

    052a97ebe7c1cb8a1bda1f557bcae0f2

    SHA1

    11a7b793dd8b8087912a7eb2e67a9b8b34ba6cda

    SHA256

    90e0e957110a8d780b32f570fb0089241db1c5ca4ea614a7b654206427e5e7f0

    SHA512

    093f06ee10aebbe26413f9e91c2a0c25a27badbf2325a460a178418cc746e9053f45e3867670f623b57215ea5bbabeda6f630b471392809a3967c629f4b7b254

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
    Filesize

    33KB

    MD5

    052a97ebe7c1cb8a1bda1f557bcae0f2

    SHA1

    11a7b793dd8b8087912a7eb2e67a9b8b34ba6cda

    SHA256

    90e0e957110a8d780b32f570fb0089241db1c5ca4ea614a7b654206427e5e7f0

    SHA512

    093f06ee10aebbe26413f9e91c2a0c25a27badbf2325a460a178418cc746e9053f45e3867670f623b57215ea5bbabeda6f630b471392809a3967c629f4b7b254

  • memory/1440-132-0x0000000000000000-mapping.dmp