Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
476dc6541b905124ce8805d5bc7a7b70N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
476dc6541b905124ce8805d5bc7a7b70N.exe
Resource
win10v2004-20240709-en
General
-
Target
476dc6541b905124ce8805d5bc7a7b70N.exe
-
Size
39KB
-
MD5
476dc6541b905124ce8805d5bc7a7b70
-
SHA1
1d03a35c1800c758472bd62181bc4ee338fa7ede
-
SHA256
400f49be330b4d306dae126ba7e2e38fcc16db06ab993954f534671c1e3cdf4d
-
SHA512
8c704628f506dd98f6c2eb3dc201269c3e8d322a25ceb1b461b58f313747c73c8bff6fa304e562b4b2809cb8eecdb9b3dfd395afd95847e1c9cb74d1e91c6570
-
SSDEEP
768:xb6ia+xAURMDKRji3x/o7vMjR1RFzVETB:ZraCWDKU8+u
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 476dc6541b905124ce8805d5bc7a7b70N.exe -
Executes dropped EXE 1 IoCs
pid Process 4564 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 476dc6541b905124ce8805d5bc7a7b70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szgfw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4564 4884 476dc6541b905124ce8805d5bc7a7b70N.exe 84 PID 4884 wrote to memory of 4564 4884 476dc6541b905124ce8805d5bc7a7b70N.exe 84 PID 4884 wrote to memory of 4564 4884 476dc6541b905124ce8805d5bc7a7b70N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\476dc6541b905124ce8805d5bc7a7b70N.exe"C:\Users\Admin\AppData\Local\Temp\476dc6541b905124ce8805d5bc7a7b70N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5a9abd17aee1c80688ef60e6d3c90c0d7
SHA1378e6f393aeb5a525551b4323994b7693b4c650b
SHA2564de1250bd67c3830c1ee90946a704bf8970c2cafc41e060fbb949a93fdd78b7d
SHA5128f1862f4ead7648afb974eb0f738c9f58389032d4c0071251f0e3b232e015f3620745a63dda98f5890424f5f1630fe61cc4c41c8259767e9433bb401fcaab3ee