Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
d1633e367e9d7a04b9bbc2303415a510N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d1633e367e9d7a04b9bbc2303415a510N.exe
Resource
win10v2004-20240802-en
General
-
Target
d1633e367e9d7a04b9bbc2303415a510N.exe
-
Size
5KB
-
MD5
d1633e367e9d7a04b9bbc2303415a510
-
SHA1
0ad573faf575cc34e513d59123066acb0b0e412b
-
SHA256
bd309242a9fc345c42573920f71608a24e91fa36658f1a9e5b44359c0a3a2292
-
SHA512
cb79d4ab2a1bccbd35040dbb73af98f841d9a850fccb348dc3e4283e0c3ae96b3901377e1c0f323b122053ebe5cda596bf63ddcdaadaba8d0d0b96a99394dd7f
-
SSDEEP
96:Z0v4mUWKh9ctgC1R66nKymV44ShR1qqzhS:9mUWKs/66nKfzShXg
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2664 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1832 d1633e367e9d7a04b9bbc2303415a510N.exe 1832 d1633e367e9d7a04b9bbc2303415a510N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1633e367e9d7a04b9bbc2303415a510N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2664 1832 d1633e367e9d7a04b9bbc2303415a510N.exe 30 PID 1832 wrote to memory of 2664 1832 d1633e367e9d7a04b9bbc2303415a510N.exe 30 PID 1832 wrote to memory of 2664 1832 d1633e367e9d7a04b9bbc2303415a510N.exe 30 PID 1832 wrote to memory of 2664 1832 d1633e367e9d7a04b9bbc2303415a510N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1633e367e9d7a04b9bbc2303415a510N.exe"C:\Users\Admin\AppData\Local\Temp\d1633e367e9d7a04b9bbc2303415a510N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5852a492c218fb2e3f2c662699d4b2a3d
SHA16afedfddf9f5ef604bb23b4f9dbdbed0adedc867
SHA2562efcb013cfe6bfc89f3e9167854024ee42b4199f3e1b86bfcfb06f1ce798ece9
SHA5124545b0fc26647135f476c3a94a8101879c73402e69f7ae8c4f29a4fe807259ac9e3f2861e5a135dd59cc5bb7ccbadab5aa60b23954f90cda80e9279e676dbfb5