Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe
Resource
win10v2004-20241007-en
General
-
Target
a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe
-
Size
31KB
-
MD5
b8c3105a2b4c3027de978b2842127e50
-
SHA1
3cd5a192e894497177593e550d68a80e53e53bae
-
SHA256
a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbb
-
SHA512
f17a9538644b02804f2a1ee272d47e33986accee6512a888ec6f174cfc947192a61822a5d04f64387b2d341e6743a2a05f069c44a1da845287e42d353633e445
-
SSDEEP
768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rh95k5N:GY9jw/dUT62rGdiUOWWrNmN
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Upatre family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe -
Executes dropped EXE 1 IoCs
pid Process 1472 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szgfw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1472 2912 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe 95 PID 2912 wrote to memory of 1472 2912 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe 95 PID 2912 wrote to memory of 1472 2912 a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe"C:\Users\Admin\AppData\Local\Temp\a6ca305489227b750488c24b01956340696edcafc954e68338e6ded4094d8fbbN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD57808e2bbcf5d80b7d4506e3aec41c045
SHA1940466f48da747760dc66e4174a3a85ce93a7bf9
SHA256f6c48879ef890840411ade6fec2c1fad44404c7aa15554cd1b8354cb66421812
SHA51232d6d40c7e2e4564e0c11747da49fcd4205797553c8d89bd85c48b5604e23a3d867df9116c4770475c75a8288a0d482b4e528225788d272fdc960a1aa7dd0fea