Analysis
-
max time kernel
149s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 13:45
Static task
static1
Behavioral task
behavioral1
Sample
bb943bb0b26e1aa22a6fa70cc33df387.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bb943bb0b26e1aa22a6fa70cc33df387.exe
Resource
win10v2004-20231215-en
General
-
Target
bb943bb0b26e1aa22a6fa70cc33df387.exe
-
Size
41KB
-
MD5
bb943bb0b26e1aa22a6fa70cc33df387
-
SHA1
db8f6191dc264e12b52d5dae2b08c0f9d8849cfe
-
SHA256
155a9681cb56bd9c1cf03fd71228584c01fa709eafe74a9694917cfe8f0bd635
-
SHA512
d628adb71c7a060ab415ed767f3a4e5dea18898be977a354d7a49ab115b6dc2cbb338d595af69cecd40849522272adb0e781e90cb05b36dfbd763d276d6bebea
-
SSDEEP
768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rCBsPGTWikRyyyx8ltylQ:GY9jw/dUT62rGdiUOWWrC6P6Tw
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation bb943bb0b26e1aa22a6fa70cc33df387.exe -
Executes dropped EXE 1 IoCs
pid Process 396 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4724 wrote to memory of 396 4724 bb943bb0b26e1aa22a6fa70cc33df387.exe 93 PID 4724 wrote to memory of 396 4724 bb943bb0b26e1aa22a6fa70cc33df387.exe 93 PID 4724 wrote to memory of 396 4724 bb943bb0b26e1aa22a6fa70cc33df387.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb943bb0b26e1aa22a6fa70cc33df387.exe"C:\Users\Admin\AppData\Local\Temp\bb943bb0b26e1aa22a6fa70cc33df387.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD51655f939c0be23b5023ec1760cd71b69
SHA1481b25f0d130222eae9f0972d9e8ad225340f3ed
SHA256eefbe057cd94a9d5c61b32f76889de82ad9e781659064595db681480e7d5020e
SHA5128dac9030b077e5ef10de474d75c9f4f56c72c5623afe2f554d5e212d97e9a5136ed0bf6f29cbc3bb5bfe9cd2018c1e7a8a11ceac155f6592d913ef427daeca88
-
Filesize
41KB
MD50c251f58732c8ffd2a574648fa1083c4
SHA1ae92e9dc0b13d4032ba16662e767fbde1e022d9a
SHA256e51fd323f82d98938998193cdad8dff7cbf67010a324f36d465f42ab7c986f17
SHA512872f417032036d3fae590113e915c7b66d108819a6b8b5693072d12a912788473f2560419e9604eecc12819b2aba06b623d83e6fe89f4b04f162a736a48196c9