Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-09-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
476dc6541b905124ce8805d5bc7a7b70N.exe
Resource
win10-20240404-en
General
-
Target
476dc6541b905124ce8805d5bc7a7b70N.exe
-
Size
39KB
-
MD5
476dc6541b905124ce8805d5bc7a7b70
-
SHA1
1d03a35c1800c758472bd62181bc4ee338fa7ede
-
SHA256
400f49be330b4d306dae126ba7e2e38fcc16db06ab993954f534671c1e3cdf4d
-
SHA512
8c704628f506dd98f6c2eb3dc201269c3e8d322a25ceb1b461b58f313747c73c8bff6fa304e562b4b2809cb8eecdb9b3dfd395afd95847e1c9cb74d1e91c6570
-
SSDEEP
768:xb6ia+xAURMDKRji3x/o7vMjR1RFzVETB:ZraCWDKU8+u
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 4384 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 476dc6541b905124ce8805d5bc7a7b70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szgfw.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4596 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 OpenWith.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe 2860 OpenWith.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4384 4912 476dc6541b905124ce8805d5bc7a7b70N.exe 72 PID 4912 wrote to memory of 4384 4912 476dc6541b905124ce8805d5bc7a7b70N.exe 72 PID 4912 wrote to memory of 4384 4912 476dc6541b905124ce8805d5bc7a7b70N.exe 72 PID 2860 wrote to memory of 4596 2860 OpenWith.exe 74 PID 2860 wrote to memory of 4596 2860 OpenWith.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\476dc6541b905124ce8805d5bc7a7b70N.exe"C:\Users\Admin\AppData\Local\Temp\476dc6541b905124ce8805d5bc7a7b70N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\UpdateAssert.pcx2⤵
- Opens file in notepad (likely ransom note)
PID:4596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5a9abd17aee1c80688ef60e6d3c90c0d7
SHA1378e6f393aeb5a525551b4323994b7693b4c650b
SHA2564de1250bd67c3830c1ee90946a704bf8970c2cafc41e060fbb949a93fdd78b7d
SHA5128f1862f4ead7648afb974eb0f738c9f58389032d4c0071251f0e3b232e015f3620745a63dda98f5890424f5f1630fe61cc4c41c8259767e9433bb401fcaab3ee