Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe
Resource
win10v2004-20241007-en
General
-
Target
a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe
-
Size
31KB
-
MD5
b8c3105a2b4c3027de978b2842127e50
-
SHA1
3cd5a192e894497177593e550d68a80e53e53bae
-
SHA256
a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbb
-
SHA512
f17a9538644b02804f2a1ee272d47e33986accee6512a888ec6f174cfc947192a61822a5d04f64387b2d341e6743a2a05f069c44a1da845287e42d353633e445
-
SSDEEP
768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rh95k5N:GY9jw/dUT62rGdiUOWWrNmN
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Upatre family
-
Executes dropped EXE 1 IoCs
pid Process 2404 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe 2000 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2404 2000 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe 31 PID 2000 wrote to memory of 2404 2000 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe 31 PID 2000 wrote to memory of 2404 2000 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe 31 PID 2000 wrote to memory of 2404 2000 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe"C:\Users\Admin\AppData\Local\Temp\a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD57808e2bbcf5d80b7d4506e3aec41c045
SHA1940466f48da747760dc66e4174a3a85ce93a7bf9
SHA256f6c48879ef890840411ade6fec2c1fad44404c7aa15554cd1b8354cb66421812
SHA51232d6d40c7e2e4564e0c11747da49fcd4205797553c8d89bd85c48b5604e23a3d867df9116c4770475c75a8288a0d482b4e528225788d272fdc960a1aa7dd0fea