Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
7232299e2255e8399dff79f545b52f97.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7232299e2255e8399dff79f545b52f97.exe
Resource
win10v2004-20231215-en
General
-
Target
7232299e2255e8399dff79f545b52f97.exe
-
Size
135KB
-
MD5
7232299e2255e8399dff79f545b52f97
-
SHA1
b4ffd08ed61aec8ae446c5423a53964874f03053
-
SHA256
47261709e00ac59fcf67c2ae5ce7de47185f4ee1f370a520cfe030090f48d660
-
SHA512
bdc55d07ac4c568c83376f9f349b98f87d25f48616397daafb77b3a56e6b689e7c7cf1c875559c100d071919aae5c6546746a7351220545b1c2030804a6ea33d
-
SSDEEP
3072:tY9CUT62/UOVMgJsgJMgJogJwgJ0zqgJ01J3RgJ01JygJ01JK8gJ01JK2gJ01JK8:tY9C8QyFJlJFJRJZJqJyJ3CJyJbJyJWs
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2972 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 7232299e2255e8399dff79f545b52f97.exe 1960 7232299e2255e8399dff79f545b52f97.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2972 1960 7232299e2255e8399dff79f545b52f97.exe 28 PID 1960 wrote to memory of 2972 1960 7232299e2255e8399dff79f545b52f97.exe 28 PID 1960 wrote to memory of 2972 1960 7232299e2255e8399dff79f545b52f97.exe 28 PID 1960 wrote to memory of 2972 1960 7232299e2255e8399dff79f545b52f97.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7232299e2255e8399dff79f545b52f97.exe"C:\Users\Admin\AppData\Local\Temp\7232299e2255e8399dff79f545b52f97.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5d7f85fcb16e80e5bb3358770ab84f584
SHA10e496fdd010c534278796f96f9a37e5c728872ec
SHA2563f88d2581ea8e8f52575a1397a7b8663583a2825285a1e2a2f2ad21ce8ac8bb8
SHA512f2092a567427e4ff5a2782d639f815c2716a0012b9b595ecc41421022a53054dc85cdd3a938581d532237ee493df243e0f05df75a742be37aaf04c8a26f93e5f
-
Filesize
17KB
MD59e4051da88054dc5e930243c2c0cd1d7
SHA15bca2f22439cd71d68cc862279c427f321e75c88
SHA256b4e01759d6d4cef739119bc1a84cb8cfe1f457a97aab719bf08f44b7a38804e1
SHA512ad39b57762abcf7c6cba0f63c3ebf59985c8ef61a5e28c19f99aabeaa4d82d14633ff5c6b6473fa3894fb2c3b25e1d7577cc20b7dce76cd1ad4807d48cfc2253