Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 12:32
Static task
static1
Behavioral task
behavioral1
Sample
48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe
-
Size
93KB
-
MD5
48cc9fc3ad0bc5e9acbcbba0ad885dbe
-
SHA1
90393f99ce7fece0e503ae25e6ec430f66e53368
-
SHA256
c3a7d085818ce367a04fb2285c82e9b987a04371629111a7689d1703036204d4
-
SHA512
aed77974912f3cf73063779899e8fcd4f53f12bbcce8d7cc53cf40a5b8b97fe43d08c4950576fc2d056dd5b5f4dfc688f67a6a45e3e98da64c3ee478d65036ce
-
SSDEEP
1536:iY9jw/dUT62rGdiUOWWrMu8i8N8tz8b8XtP8XtH8XtgU7:iY9CUT62/UOVMu8i8N898b8XN8X98XGg
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation 48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 4392 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1336 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 4392 1600 48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe 93 PID 1600 wrote to memory of 4392 1600 48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe 93 PID 1600 wrote to memory of 4392 1600 48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe"C:\Users\Admin\AppData\Local\Temp\48cc9fc3ad0bc5e9acbcbba0ad885dbe_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4392
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2240
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD536478af47f05280cb6ffe86ddad0f096
SHA171d87ad08754400938aa67a7a42dc953b13cf487
SHA2566488033d0db2b7bc345f45ab41ad0138060b804a2dbb97bec7fc6ea36f4b124f
SHA512bf1f58b2e83b660f727a2e795d7d24aa50efc6cb2144fb2eccfb20978899986c91215e7d90c79dd1c9d80d3dfc4ddb78fd8f50aeef58d0722a84ad377f52c0f6
-
Filesize
94KB
MD536478af47f05280cb6ffe86ddad0f096
SHA171d87ad08754400938aa67a7a42dc953b13cf487
SHA2566488033d0db2b7bc345f45ab41ad0138060b804a2dbb97bec7fc6ea36f4b124f
SHA512bf1f58b2e83b660f727a2e795d7d24aa50efc6cb2144fb2eccfb20978899986c91215e7d90c79dd1c9d80d3dfc4ddb78fd8f50aeef58d0722a84ad377f52c0f6
-
Filesize
94KB
MD536478af47f05280cb6ffe86ddad0f096
SHA171d87ad08754400938aa67a7a42dc953b13cf487
SHA2566488033d0db2b7bc345f45ab41ad0138060b804a2dbb97bec7fc6ea36f4b124f
SHA512bf1f58b2e83b660f727a2e795d7d24aa50efc6cb2144fb2eccfb20978899986c91215e7d90c79dd1c9d80d3dfc4ddb78fd8f50aeef58d0722a84ad377f52c0f6