Analysis
-
max time kernel
164s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 19:13
Static task
static1
Behavioral task
behavioral1
Sample
80c0f0a6c2bb1c6d463349567288fe06.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
80c0f0a6c2bb1c6d463349567288fe06.exe
Resource
win10v2004-20231215-en
General
-
Target
80c0f0a6c2bb1c6d463349567288fe06.exe
-
Size
43KB
-
MD5
80c0f0a6c2bb1c6d463349567288fe06
-
SHA1
b015c722e4553d4e5cf9efd5f92921429fd39f72
-
SHA256
1c2112c465ec9bfe62010a5fc5d6293e3323a8805b66adc9320dbe685041dc7a
-
SHA512
4ea517d53472c54510d1b3dd05a5afd07fe2a864d174408b666e1eacaf9a5f00ca516d5308847d5ab7567fc2ae1a0c06805228a5466d603090500ed9065a7a8b
-
SSDEEP
768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rCBsPGTWikRyyyxOJzlyl7t:GY9jw/dUT62rGdiUOWWrC6P6TT
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 80c0f0a6c2bb1c6d463349567288fe06.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2520 4420 80c0f0a6c2bb1c6d463349567288fe06.exe 94 PID 4420 wrote to memory of 2520 4420 80c0f0a6c2bb1c6d463349567288fe06.exe 94 PID 4420 wrote to memory of 2520 4420 80c0f0a6c2bb1c6d463349567288fe06.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\80c0f0a6c2bb1c6d463349567288fe06.exe"C:\Users\Admin\AppData\Local\Temp\80c0f0a6c2bb1c6d463349567288fe06.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD50b10bacec41efee92790f99ebab27c34
SHA195ccf046e15e3a4086fdd4b3bf916f52499494d6
SHA2569d41b534dfe2e95312a070246aeeb6c605e7edb35197f9abc2b4e71eaca305c0
SHA51281136ff8507fd48f38f5ce7535dd761e7da341172f244dd77e0773fc4b52891402477c2cb89abf8c51f11bd71d05c40b58e7d61a8e78136392bab7bd328cd52b