Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2022 10:49

General

  • Target

    741/8477d1ce946600f8f9772a4adc1b2d8911e1988688f768ccf645c0137dd389ae.exe

  • Size

    24KB

  • MD5

    d6fae90bfad7019089227c8bc5fe8967

  • SHA1

    2f7e6318c1fe36de5873439edea1123ff12d320d

  • SHA256

    8477d1ce946600f8f9772a4adc1b2d8911e1988688f768ccf645c0137dd389ae

  • SHA512

    84ab98809dbdefba7b8b3741884d42dba50eec01e65efa83a55428a1c2b688c60eadac25f6061e83ebb9c7762c1be661b98df6b665cd5e9dbb2316de80307054

  • SSDEEP

    768:v+qAUVByyyNylXUylqylylmMxgMyXAN5IkSFlOxXmZbLKIx07zP+:vNVrkl2oO

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\741\8477d1ce946600f8f9772a4adc1b2d8911e1988688f768ccf645c0137dd389ae.exe
    "C:\Users\Admin\AppData\Local\Temp\741\8477d1ce946600f8f9772a4adc1b2d8911e1988688f768ccf645c0137dd389ae.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    24KB

    MD5

    622451fff0f8729802cd40a0427a31ef

    SHA1

    d95de387625a38f651c3334eef293bcb9ee79a3e

    SHA256

    0e7ae7322c766b8df4f0cb1dcdc7e56621f8f6a8295176e748f2d63b13b92305

    SHA512

    be60646a6634689091677dd0abc13bba7384f49f195714600c859b884b5ff31aae08cc9363fdb861ef200ad383614473f94acd9f63b6650c396f5e071b4a3769

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    24KB

    MD5

    622451fff0f8729802cd40a0427a31ef

    SHA1

    d95de387625a38f651c3334eef293bcb9ee79a3e

    SHA256

    0e7ae7322c766b8df4f0cb1dcdc7e56621f8f6a8295176e748f2d63b13b92305

    SHA512

    be60646a6634689091677dd0abc13bba7384f49f195714600c859b884b5ff31aae08cc9363fdb861ef200ad383614473f94acd9f63b6650c396f5e071b4a3769