Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 17:41

General

  • Target

    6cc24a00417df587462a6716f1a17ba5.exe

  • Size

    13KB

  • MD5

    6cc24a00417df587462a6716f1a17ba5

  • SHA1

    b1b96ade113c41f5c508cb36611da8dda1f8f556

  • SHA256

    165b7c8a26704fe3e7ec2f8c8324b0c564eebe4b839c05106251d9b51f5e110a

  • SHA512

    0b66b37c8af680b3206d9749a093a4bf9102dcbe41810447524dd01256193a5935e5168b9dda4817a51410914343ada427362839e77852c8097ac8365f180535

  • SSDEEP

    384:6K+dKfzQHxFxRmyja4QhiP7UlY/pjK7aylryyylQlylyyylk5ylNcQ:v+dAURFxna4QAPQlYg7aylryyylQlylS

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cc24a00417df587462a6716f1a17ba5.exe
    "C:\Users\Admin\AppData\Local\Temp\6cc24a00417df587462a6716f1a17ba5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    13KB

    MD5

    8b876a9787cbda6268b96e77e3256aa5

    SHA1

    fb0b59ac19cc0b380d78cc46362626f08367c6d6

    SHA256

    2725e944b08af4640bf9d63d5360bec55b1010a4ae7b28b2f4464604b33ea08a

    SHA512

    79c6021b2790cbaf91884c5fe0473b289e1312d86ec246246f76fd857c141c4146010db656d880ff690fcd5eabdb1904db42c035d025432248043b84fff62dfb