Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 16:23
Static task
static1
Behavioral task
behavioral1
Sample
949711b8e32f97493d6bee9c46b17290N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
949711b8e32f97493d6bee9c46b17290N.exe
Resource
win10v2004-20240802-en
General
-
Target
949711b8e32f97493d6bee9c46b17290N.exe
-
Size
43KB
-
MD5
949711b8e32f97493d6bee9c46b17290
-
SHA1
281af3d2efb8252d77a38127cbb7917892387b65
-
SHA256
b32dad3768228701b6bd7d12937f60a369b855a449eab4d18b4a12b58f4d580f
-
SHA512
2e6e09c1590666f33ec9f05dbd3ab0602d9b4c4fa6d5b9370219c3cfa3eb54e8b32d734b2b891f06e46c9c01163cd7bd2b9559ca9071c453a89c23888b3c6227
-
SSDEEP
768:of1Y9RRw/dUT6vurTxzkUOyGAv+rIwd5MdQ95k5mw4:CY9jw/dUT62rTx4UOWWrXq8m2
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
Processes:
szgfw.exepid Process 2560 szgfw.exe -
Loads dropped DLL 2 IoCs
Processes:
949711b8e32f97493d6bee9c46b17290N.exepid Process 2680 949711b8e32f97493d6bee9c46b17290N.exe 2680 949711b8e32f97493d6bee9c46b17290N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
949711b8e32f97493d6bee9c46b17290N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949711b8e32f97493d6bee9c46b17290N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
949711b8e32f97493d6bee9c46b17290N.exedescription pid Process procid_target PID 2680 wrote to memory of 2560 2680 949711b8e32f97493d6bee9c46b17290N.exe 31 PID 2680 wrote to memory of 2560 2680 949711b8e32f97493d6bee9c46b17290N.exe 31 PID 2680 wrote to memory of 2560 2680 949711b8e32f97493d6bee9c46b17290N.exe 31 PID 2680 wrote to memory of 2560 2680 949711b8e32f97493d6bee9c46b17290N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\949711b8e32f97493d6bee9c46b17290N.exe"C:\Users\Admin\AppData\Local\Temp\949711b8e32f97493d6bee9c46b17290N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5589159ee3da07cfdfdbdfeb356105614
SHA153e045c0efc57cf5b6c5e7d667357d11b1b38f91
SHA256873bd2f0df116c6811c26be4849f8fc9c176e9f3c36db349d2a55037a4fcc9f8
SHA5120110df29c8263ce35810c4ee1e2611c44fe80e3deb5cbf0394a79d2967c6d7570787b42c2539ea97a4693c8da41dd3cdbb13b51ea081d0c55e05b687a1272fbf