Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
29-11-2023 16:59
Static task
static1
Behavioral task
behavioral1
Sample
a62bfda431fb5970c7ef246f90314ed9.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a62bfda431fb5970c7ef246f90314ed9.exe
Resource
win10v2004-20231127-en
General
-
Target
a62bfda431fb5970c7ef246f90314ed9.exe
-
Size
63KB
-
MD5
a62bfda431fb5970c7ef246f90314ed9
-
SHA1
81b9cffa0a3a69a709b2aa90ecd3acc91f6bdfe4
-
SHA256
9dbbf9c16cb8338edb14f349e8f9e688e556f5262bf7c7b3783c65bb396984e6
-
SHA512
104623bf1d9f8c8c782a86b400d551771f15ad0513724d5394679317c3b20b6fcb90d950ff838c1844ea4ef05e025540849ad0a0337f1f4eff8e12d9d42672df
-
SSDEEP
1536:5Y9jw/dUT62rGdiUOWWrMffJ+AxM+I+ceWgG:5Y9CUT62/UOVMffJ+AW+I+cT
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2444 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2364 a62bfda431fb5970c7ef246f90314ed9.exe 2364 a62bfda431fb5970c7ef246f90314ed9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2444 2364 a62bfda431fb5970c7ef246f90314ed9.exe 28 PID 2364 wrote to memory of 2444 2364 a62bfda431fb5970c7ef246f90314ed9.exe 28 PID 2364 wrote to memory of 2444 2364 a62bfda431fb5970c7ef246f90314ed9.exe 28 PID 2364 wrote to memory of 2444 2364 a62bfda431fb5970c7ef246f90314ed9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a62bfda431fb5970c7ef246f90314ed9.exe"C:\Users\Admin\AppData\Local\Temp\a62bfda431fb5970c7ef246f90314ed9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD536424798166757571abca70cc083bbfe
SHA1069ea9e26681f7d48d7877624004433dc0b31e1e
SHA25677f14e2359ad181057e6600c68b3d2611a5e72dd21249bc249f46e1c7726d489
SHA512b7087dab59eb1cbc3626a1b92708ba2efefb12cf2af62f7efaa81d78728acd0033ff75e13d5358c454996a839a4ce4b041bdd01c52321331b0f5e73f179331ad
-
Filesize
63KB
MD536424798166757571abca70cc083bbfe
SHA1069ea9e26681f7d48d7877624004433dc0b31e1e
SHA25677f14e2359ad181057e6600c68b3d2611a5e72dd21249bc249f46e1c7726d489
SHA512b7087dab59eb1cbc3626a1b92708ba2efefb12cf2af62f7efaa81d78728acd0033ff75e13d5358c454996a839a4ce4b041bdd01c52321331b0f5e73f179331ad
-
Filesize
63KB
MD536424798166757571abca70cc083bbfe
SHA1069ea9e26681f7d48d7877624004433dc0b31e1e
SHA25677f14e2359ad181057e6600c68b3d2611a5e72dd21249bc249f46e1c7726d489
SHA512b7087dab59eb1cbc3626a1b92708ba2efefb12cf2af62f7efaa81d78728acd0033ff75e13d5358c454996a839a4ce4b041bdd01c52321331b0f5e73f179331ad
-
Filesize
63KB
MD536424798166757571abca70cc083bbfe
SHA1069ea9e26681f7d48d7877624004433dc0b31e1e
SHA25677f14e2359ad181057e6600c68b3d2611a5e72dd21249bc249f46e1c7726d489
SHA512b7087dab59eb1cbc3626a1b92708ba2efefb12cf2af62f7efaa81d78728acd0033ff75e13d5358c454996a839a4ce4b041bdd01c52321331b0f5e73f179331ad
-
Filesize
63KB
MD536424798166757571abca70cc083bbfe
SHA1069ea9e26681f7d48d7877624004433dc0b31e1e
SHA25677f14e2359ad181057e6600c68b3d2611a5e72dd21249bc249f46e1c7726d489
SHA512b7087dab59eb1cbc3626a1b92708ba2efefb12cf2af62f7efaa81d78728acd0033ff75e13d5358c454996a839a4ce4b041bdd01c52321331b0f5e73f179331ad