Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 16:23
Static task
static1
Behavioral task
behavioral1
Sample
949711b8e32f97493d6bee9c46b17290N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
949711b8e32f97493d6bee9c46b17290N.exe
Resource
win10v2004-20240802-en
General
-
Target
949711b8e32f97493d6bee9c46b17290N.exe
-
Size
43KB
-
MD5
949711b8e32f97493d6bee9c46b17290
-
SHA1
281af3d2efb8252d77a38127cbb7917892387b65
-
SHA256
b32dad3768228701b6bd7d12937f60a369b855a449eab4d18b4a12b58f4d580f
-
SHA512
2e6e09c1590666f33ec9f05dbd3ab0602d9b4c4fa6d5b9370219c3cfa3eb54e8b32d734b2b891f06e46c9c01163cd7bd2b9559ca9071c453a89c23888b3c6227
-
SSDEEP
768:of1Y9RRw/dUT6vurTxzkUOyGAv+rIwd5MdQ95k5mw4:CY9jw/dUT62rTx4UOWWrXq8m2
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 949711b8e32f97493d6bee9c46b17290N.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 949711b8e32f97493d6bee9c46b17290N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szgfw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1656 wrote to memory of 4856 1656 949711b8e32f97493d6bee9c46b17290N.exe 88 PID 1656 wrote to memory of 4856 1656 949711b8e32f97493d6bee9c46b17290N.exe 88 PID 1656 wrote to memory of 4856 1656 949711b8e32f97493d6bee9c46b17290N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\949711b8e32f97493d6bee9c46b17290N.exe"C:\Users\Admin\AppData\Local\Temp\949711b8e32f97493d6bee9c46b17290N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5589159ee3da07cfdfdbdfeb356105614
SHA153e045c0efc57cf5b6c5e7d667357d11b1b38f91
SHA256873bd2f0df116c6811c26be4849f8fc9c176e9f3c36db349d2a55037a4fcc9f8
SHA5120110df29c8263ce35810c4ee1e2611c44fe80e3deb5cbf0394a79d2967c6d7570787b42c2539ea97a4693c8da41dd3cdbb13b51ea081d0c55e05b687a1272fbf