Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2024 16:23

General

  • Target

    949711b8e32f97493d6bee9c46b17290N.exe

  • Size

    43KB

  • MD5

    949711b8e32f97493d6bee9c46b17290

  • SHA1

    281af3d2efb8252d77a38127cbb7917892387b65

  • SHA256

    b32dad3768228701b6bd7d12937f60a369b855a449eab4d18b4a12b58f4d580f

  • SHA512

    2e6e09c1590666f33ec9f05dbd3ab0602d9b4c4fa6d5b9370219c3cfa3eb54e8b32d734b2b891f06e46c9c01163cd7bd2b9559ca9071c453a89c23888b3c6227

  • SSDEEP

    768:of1Y9RRw/dUT6vurTxzkUOyGAv+rIwd5MdQ95k5mw4:CY9jw/dUT62rTx4UOWWrXq8m2

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\949711b8e32f97493d6bee9c46b17290N.exe
    "C:\Users\Admin\AppData\Local\Temp\949711b8e32f97493d6bee9c46b17290N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    43KB

    MD5

    589159ee3da07cfdfdbdfeb356105614

    SHA1

    53e045c0efc57cf5b6c5e7d667357d11b1b38f91

    SHA256

    873bd2f0df116c6811c26be4849f8fc9c176e9f3c36db349d2a55037a4fcc9f8

    SHA512

    0110df29c8263ce35810c4ee1e2611c44fe80e3deb5cbf0394a79d2967c6d7570787b42c2539ea97a4693c8da41dd3cdbb13b51ea081d0c55e05b687a1272fbf

  • memory/2560-14-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2560-15-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2680-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2680-1-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2680-11-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB