Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 19:35
Static task
static1
Behavioral task
behavioral1
Sample
85d63b0ab6a7fc9894b73d64e95a53e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85d63b0ab6a7fc9894b73d64e95a53e7.exe
Resource
win10v2004-20231215-en
General
-
Target
85d63b0ab6a7fc9894b73d64e95a53e7.exe
-
Size
13KB
-
MD5
85d63b0ab6a7fc9894b73d64e95a53e7
-
SHA1
f53ff9fa9faa13f23c5706635aa4a3816aba81c9
-
SHA256
09dd3dd351d141f2ab607a9303cb00bbdf1a16521f5b64310fd6f560789231d3
-
SHA512
63074c122527d81c99f2089455775f4c82d2e708a1638198febd7de98425881f33d469f993b66312f328a2eb7636a1ab58385eb03389dbd1d6a198cf809e7bb5
-
SSDEEP
384:6K+dKfzQHxFxRmyja4QhiP7UlY/pjKkFlplVDuyUyGyylqyylQ:v+dAURFxna4QAPQlYgkFlplVDuyUyGy4
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 85d63b0ab6a7fc9894b73d64e95a53e7.exe -
Executes dropped EXE 1 IoCs
pid Process 4260 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4260 4980 85d63b0ab6a7fc9894b73d64e95a53e7.exe 90 PID 4980 wrote to memory of 4260 4980 85d63b0ab6a7fc9894b73d64e95a53e7.exe 90 PID 4980 wrote to memory of 4260 4980 85d63b0ab6a7fc9894b73d64e95a53e7.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\85d63b0ab6a7fc9894b73d64e95a53e7.exe"C:\Users\Admin\AppData\Local\Temp\85d63b0ab6a7fc9894b73d64e95a53e7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD528614a3666c4fb3e99e7094d925ae7de
SHA1a6df6df11bc9d4835abdf992bb5a70abb28203fb
SHA2563343282e175151c23064a970d828cde06051d32b7fe2d692227eb3e297ec91bb
SHA512dce25a09d01cb4f94fa78b9f3ef9c2d1d07d6da3a5277226caf7419213c5c655b668dc921546cd83fd09606ae0b4c1dd6613321df0798efc36818356faac8dc7