Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
476dc6541b905124ce8805d5bc7a7b70N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
476dc6541b905124ce8805d5bc7a7b70N.exe
Resource
win10v2004-20240709-en
General
-
Target
476dc6541b905124ce8805d5bc7a7b70N.exe
-
Size
39KB
-
MD5
476dc6541b905124ce8805d5bc7a7b70
-
SHA1
1d03a35c1800c758472bd62181bc4ee338fa7ede
-
SHA256
400f49be330b4d306dae126ba7e2e38fcc16db06ab993954f534671c1e3cdf4d
-
SHA512
8c704628f506dd98f6c2eb3dc201269c3e8d322a25ceb1b461b58f313747c73c8bff6fa304e562b4b2809cb8eecdb9b3dfd395afd95847e1c9cb74d1e91c6570
-
SSDEEP
768:xb6ia+xAURMDKRji3x/o7vMjR1RFzVETB:ZraCWDKU8+u
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2440 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2320 476dc6541b905124ce8805d5bc7a7b70N.exe 2320 476dc6541b905124ce8805d5bc7a7b70N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 476dc6541b905124ce8805d5bc7a7b70N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2440 2320 476dc6541b905124ce8805d5bc7a7b70N.exe 30 PID 2320 wrote to memory of 2440 2320 476dc6541b905124ce8805d5bc7a7b70N.exe 30 PID 2320 wrote to memory of 2440 2320 476dc6541b905124ce8805d5bc7a7b70N.exe 30 PID 2320 wrote to memory of 2440 2320 476dc6541b905124ce8805d5bc7a7b70N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\476dc6541b905124ce8805d5bc7a7b70N.exe"C:\Users\Admin\AppData\Local\Temp\476dc6541b905124ce8805d5bc7a7b70N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5a9abd17aee1c80688ef60e6d3c90c0d7
SHA1378e6f393aeb5a525551b4323994b7693b4c650b
SHA2564de1250bd67c3830c1ee90946a704bf8970c2cafc41e060fbb949a93fdd78b7d
SHA5128f1862f4ead7648afb974eb0f738c9f58389032d4c0071251f0e3b232e015f3620745a63dda98f5890424f5f1630fe61cc4c41c8259767e9433bb401fcaab3ee