Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 02:52

General

  • Target

    cdfa537f7680218487e535467e4297cd37a41afd7cfc36eab22f3ac719d3a28d.exe

  • Size

    26KB

  • MD5

    7ed147331745e603ebcdfa2cdf1a8936

  • SHA1

    08c5db4466c97dddc9df29dc503cf289f82842df

  • SHA256

    cdfa537f7680218487e535467e4297cd37a41afd7cfc36eab22f3ac719d3a28d

  • SHA512

    4d929c535d3f1eaa72a5dc5541d77b04e31fa555f8bf409b2f37182d182b592d288c523204eccbb2fbabd40513e4762e9063985ddd258166e7cccd019e1a40eb

  • SSDEEP

    384:bK+xKfzQ2XFpOQGR9zos2clAKLHRN74u56/R9zZwu99g5F4X:W+xAUiXOQ69zbjlAAX5e9zH

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdfa537f7680218487e535467e4297cd37a41afd7cfc36eab22f3ac719d3a28d.exe
    "C:\Users\Admin\AppData\Local\Temp\cdfa537f7680218487e535467e4297cd37a41afd7cfc36eab22f3ac719d3a28d.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    26KB

    MD5

    26660346fbf24d2f656b3103b8ff6b82

    SHA1

    c88a592e46a82b327bfefb81ba0a2dcd654119f1

    SHA256

    8b87689c13564ee7fde4cfff203dd06e97ceba3c265c68f0d26660786cb4d430

    SHA512

    4e1bdbff45854892bf56198c7db45e9f717ad94cca4e5df9acdfcc6235e3aa163557aca9e1c8507d1c62fd45aaffbab99ae531bb10b603f9ddf267da1fea5bac