Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2023 20:27

General

  • Target

    945af19942a42cbfccec16e60b38ae71.exe

  • Size

    42KB

  • MD5

    945af19942a42cbfccec16e60b38ae71

  • SHA1

    0ef39afbdcdfbd07e3123fb715979f16f40d63db

  • SHA256

    4eaeda6deb1658062b9903221d43984610af9c792a62575342fe1abb5c5294e6

  • SHA512

    7ca81668e8317971a7716b6f946ce99a984eb0cbca41ca6a879ce718a12fa69d1c50efa79dea9cb4515496b93dcbb8c3fb536057cd8efea6d2f14d537e638560

  • SSDEEP

    768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rCBsPGTWikRyyyxO9ylylyQ:GY9jw/dUT62rGdiUOWWrC6P6TG

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\945af19942a42cbfccec16e60b38ae71.exe
    "C:\Users\Admin\AppData\Local\Temp\945af19942a42cbfccec16e60b38ae71.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:1112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    42KB

    MD5

    c3b5058d88e1302f0e6742c3ec041e2c

    SHA1

    0f8e05b7f0e832fc653c0c96bb6b8f2f435470fd

    SHA256

    7fd6313e0f18d85a4ad0965e75c7f01ea530f918f687ebee128bbd54d6b54644

    SHA512

    7357439d852fe29c47c2b4f35d717095e46dead8482041173d44e0f78d803b14f6ef84fc49f00b4813b5affe5bd992307553868355a3f062cf7ab7b97566b31e

  • memory/1112-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1776-0-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/1776-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB