Analysis

  • max time kernel
    151s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2022 10:49

General

  • Target

    741/5dfb0608d3a13aab1b8fbeb22f15e573995c9d59907ff57882364006235b9bcd.exe

  • Size

    24KB

  • MD5

    7c16a174e99583c7dcd500711bdc17cc

  • SHA1

    ac77aaca03d755303e04ea1fd0430f0f834c6ee9

  • SHA256

    5dfb0608d3a13aab1b8fbeb22f15e573995c9d59907ff57882364006235b9bcd

  • SHA512

    fdc6ef39b78b327e9b45933c1318e370d5dae08ebaf5b083de1ae91b0b7bd7488e97998fe4fcc62b82542a8cd80b13f8fe19ca1100819b6321cd68623a31a0bc

  • SSDEEP

    768:v+qAUVByyyNylXUylqylylmMxgMyXAN5IkSFlOxXmk/oghRFDQ:vNVrklhI

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\741\5dfb0608d3a13aab1b8fbeb22f15e573995c9d59907ff57882364006235b9bcd.exe
    "C:\Users\Admin\AppData\Local\Temp\741\5dfb0608d3a13aab1b8fbeb22f15e573995c9d59907ff57882364006235b9bcd.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:4324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    25KB

    MD5

    e375e6b1f8517fd826ff05d25e02167f

    SHA1

    334a848c349f0eb03f072420b19cb06618f553ed

    SHA256

    ee4dfd12caa60969d775ea30d0bd651bce88410a695584ac1c44bfb00932cbb4

    SHA512

    cfe3f1e509b7ff2f1cb1a59bc71fc566ef727f138410c35aba4e060b92b220062f6dd50fac334719d4119a235fe7f5598977caec00412b36c1c029475015f57f

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    25KB

    MD5

    e375e6b1f8517fd826ff05d25e02167f

    SHA1

    334a848c349f0eb03f072420b19cb06618f553ed

    SHA256

    ee4dfd12caa60969d775ea30d0bd651bce88410a695584ac1c44bfb00932cbb4

    SHA512

    cfe3f1e509b7ff2f1cb1a59bc71fc566ef727f138410c35aba4e060b92b220062f6dd50fac334719d4119a235fe7f5598977caec00412b36c1c029475015f57f