Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
UPGCSS.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
UPGCSS.exe
Resource
win10v2004-20240802-en
General
-
Target
UPGCSS.exe
-
Size
1.2MB
-
MD5
99b098b23ced1a199145fe5577c9de91
-
SHA1
84031f7b3c97759d56b14591e1cf0ba1f552f201
-
SHA256
8979e74303550e257eb92225507bf2fb128cebde5f3f6e36b4236e822e194f64
-
SHA512
05cf74845b264ef2bf6faf8e8900e0f41baa04d43f989a33abbbb1cae9311789d50388510c836cf6dc5f314000572884a9823973a2c4950bfe0ba4699288fbfb
-
SSDEEP
24576:7DYoP1JgW1tQ2IXUFTBVx2S8lsdu1Hy+mWdyYoltCeiTVS2vDuc9YDznc:7kUQIF2Aa7TVS2ru0YDT
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2288 UPGCSS.new.exe 2584 UPGCSS.exe -
Loads dropped DLL 2 IoCs
pid Process 2504 UPGCSS.exe 2288 UPGCSS.new.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPGCSS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPGCSS.new.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPGCSS.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" UPGCSS.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main UPGCSS.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch UPGCSS.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 UPGCSS.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2504 UPGCSS.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2504 UPGCSS.exe 2504 UPGCSS.exe 2504 UPGCSS.exe 2504 UPGCSS.exe 2288 UPGCSS.new.exe 2288 UPGCSS.new.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe 2584 UPGCSS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2288 2504 UPGCSS.exe 30 PID 2504 wrote to memory of 2288 2504 UPGCSS.exe 30 PID 2504 wrote to memory of 2288 2504 UPGCSS.exe 30 PID 2504 wrote to memory of 2288 2504 UPGCSS.exe 30 PID 2288 wrote to memory of 2584 2288 UPGCSS.new.exe 31 PID 2288 wrote to memory of 2584 2288 UPGCSS.new.exe 31 PID 2288 wrote to memory of 2584 2288 UPGCSS.new.exe 31 PID 2288 wrote to memory of 2584 2288 UPGCSS.new.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe"C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\UPGCSS.new.exe"C:\Users\Admin\AppData\Local\Temp\UPGCSS.new.exe" /update "C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe"C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe" /delete "C:\Users\Admin\AppData\Local\Temp\UPGCSS.new.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD599b098b23ced1a199145fe5577c9de91
SHA184031f7b3c97759d56b14591e1cf0ba1f552f201
SHA2568979e74303550e257eb92225507bf2fb128cebde5f3f6e36b4236e822e194f64
SHA51205cf74845b264ef2bf6faf8e8900e0f41baa04d43f989a33abbbb1cae9311789d50388510c836cf6dc5f314000572884a9823973a2c4950bfe0ba4699288fbfb