Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
9d7440543dce4fc117ff3391a53cb990N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9d7440543dce4fc117ff3391a53cb990N.exe
Resource
win10v2004-20240802-en
General
-
Target
9d7440543dce4fc117ff3391a53cb990N.exe
-
Size
47KB
-
MD5
9d7440543dce4fc117ff3391a53cb990
-
SHA1
9b97153d0507cdd97d17aaa083d4a400a357f274
-
SHA256
8a6f1420e4b96a220e1fe4dd1f673f28ec34c466110a7b2976ecd0c1ae1760ae
-
SHA512
72261e05b4ceaca8dee2e78db2b68041a8636b65d5a8eb50815b30daaff8dbcfb85efa644d9ce870dfd499a9fb816234813915e42aafcccded147e2c5cbbe827
-
SSDEEP
768:xf1Y9RRw/dUT6vurBkUOyGAv+rlhLhddW4dU95k5mwFW1S7MTIQ/rxF:jY9jw/dUT62rKUOWWrlhLhLT4mLWMA84
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2112 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 9d7440543dce4fc117ff3391a53cb990N.exe 2392 9d7440543dce4fc117ff3391a53cb990N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d7440543dce4fc117ff3391a53cb990N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2112 2392 9d7440543dce4fc117ff3391a53cb990N.exe 30 PID 2392 wrote to memory of 2112 2392 9d7440543dce4fc117ff3391a53cb990N.exe 30 PID 2392 wrote to memory of 2112 2392 9d7440543dce4fc117ff3391a53cb990N.exe 30 PID 2392 wrote to memory of 2112 2392 9d7440543dce4fc117ff3391a53cb990N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d7440543dce4fc117ff3391a53cb990N.exe"C:\Users\Admin\AppData\Local\Temp\9d7440543dce4fc117ff3391a53cb990N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD57a4763e1775022215d8fb9a6041a72f0
SHA1b46b8f3b2d7a47bb083d142f1b0931c909972226
SHA25663762733eb64bd4930972136f04b32a4a1e54c023bd59cd12a61598b6567c863
SHA512fc73e11b01e3ac2c8c9103d3bcbca01d5b51a6cafca83a47a851857898261996b399d48927205460c943894ebef02ae3712a3729fa0a6215fb68cc91438c3459