Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
UPGCSS.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
UPGCSS.exe
Resource
win10v2004-20240802-en
General
-
Target
UPGCSS.exe
-
Size
1.2MB
-
MD5
99b098b23ced1a199145fe5577c9de91
-
SHA1
84031f7b3c97759d56b14591e1cf0ba1f552f201
-
SHA256
8979e74303550e257eb92225507bf2fb128cebde5f3f6e36b4236e822e194f64
-
SHA512
05cf74845b264ef2bf6faf8e8900e0f41baa04d43f989a33abbbb1cae9311789d50388510c836cf6dc5f314000572884a9823973a2c4950bfe0ba4699288fbfb
-
SSDEEP
24576:7DYoP1JgW1tQ2IXUFTBVx2S8lsdu1Hy+mWdyYoltCeiTVS2vDuc9YDznc:7kUQIF2Aa7TVS2ru0YDT
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 3616 UPGCSS.new.exe 1008 UPGCSS.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPGCSS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPGCSS.new.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UPGCSS.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 UPGCSS.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1460 UPGCSS.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1460 UPGCSS.exe 1460 UPGCSS.exe 1460 UPGCSS.exe 1460 UPGCSS.exe 3616 UPGCSS.new.exe 3616 UPGCSS.new.exe 1008 UPGCSS.exe 1008 UPGCSS.exe 1008 UPGCSS.exe 1008 UPGCSS.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3616 1460 UPGCSS.exe 99 PID 1460 wrote to memory of 3616 1460 UPGCSS.exe 99 PID 1460 wrote to memory of 3616 1460 UPGCSS.exe 99 PID 3616 wrote to memory of 1008 3616 UPGCSS.new.exe 101 PID 3616 wrote to memory of 1008 3616 UPGCSS.new.exe 101 PID 3616 wrote to memory of 1008 3616 UPGCSS.new.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe"C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\UPGCSS.new.exe"C:\Users\Admin\AppData\Local\Temp\UPGCSS.new.exe" /update "C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe"C:\Users\Admin\AppData\Local\Temp\UPGCSS.exe" /delete "C:\Users\Admin\AppData\Local\Temp\UPGCSS.new.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4372,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:81⤵PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD599b098b23ced1a199145fe5577c9de91
SHA184031f7b3c97759d56b14591e1cf0ba1f552f201
SHA2568979e74303550e257eb92225507bf2fb128cebde5f3f6e36b4236e822e194f64
SHA51205cf74845b264ef2bf6faf8e8900e0f41baa04d43f989a33abbbb1cae9311789d50388510c836cf6dc5f314000572884a9823973a2c4950bfe0ba4699288fbfb