Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 07:46

General

  • Target

    ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe

  • Size

    4KB

  • MD5

    64f5816cc636e4f27170fc7dc78c38c5

  • SHA1

    757f088fbaef5695198bef0711b915e2b601c22c

  • SHA256

    ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3

  • SHA512

    f7ce5e8a7ae06e2747ace177cdb685452f2a5a1d3d4c7b29dbb76db16512347e0d029dfb1fe07ef7f23a29494dbc0cf1088f9c3cc6bcaa7e95e1f3b38bc40370

  • SSDEEP

    48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RspLnA7B8mOo4jUx7OtKGc:Z0v4mUWKh9ctgC1RcLnKymV44Sh

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe
    "C:\Users\Admin\AppData\Local\Temp\ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:5048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    4KB

    MD5

    f898224ed2e522f9897960e03c715f85

    SHA1

    200e44124300004ad0638537994902601590ef71

    SHA256

    5a803914b814dbe2a7ad1f16d331b8d0c495a5330643f218a555801d63059ab5

    SHA512

    c1fc721f1957b1d65dbaf560be5e6ae5bc29b42b1b799572f0f9933cf022b254df008a7d97148bee07e5db4e295992a72b1e9880c00495b30967f42029b7fe8c

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    4KB

    MD5

    f898224ed2e522f9897960e03c715f85

    SHA1

    200e44124300004ad0638537994902601590ef71

    SHA256

    5a803914b814dbe2a7ad1f16d331b8d0c495a5330643f218a555801d63059ab5

    SHA512

    c1fc721f1957b1d65dbaf560be5e6ae5bc29b42b1b799572f0f9933cf022b254df008a7d97148bee07e5db4e295992a72b1e9880c00495b30967f42029b7fe8c

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    4KB

    MD5

    f898224ed2e522f9897960e03c715f85

    SHA1

    200e44124300004ad0638537994902601590ef71

    SHA256

    5a803914b814dbe2a7ad1f16d331b8d0c495a5330643f218a555801d63059ab5

    SHA512

    c1fc721f1957b1d65dbaf560be5e6ae5bc29b42b1b799572f0f9933cf022b254df008a7d97148bee07e5db4e295992a72b1e9880c00495b30967f42029b7fe8c