Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe
Resource
win10v2004-20241007-en
General
-
Target
14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe
-
Size
13KB
-
MD5
8fd7b28e3f3a811059165a316b417fb0
-
SHA1
8bfb63d3eb89bd2c4036f0ffbd3ba5b3c96db9a3
-
SHA256
14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628
-
SHA512
4064579d6684b57913aab89ebff8b1c3904ac7998c8d205fb95a6b5e64f14a67f2e9c48fea5aa1237721afcbea174b6b129f585a3906802a5e309a5ba4a10cd7
-
SSDEEP
384:6K+dKfzQHxFxRmyja4QhiP7UlY/pjKhYsKUAylUmWmtsx:v+dAURFxna4QAPQlYghxKUAyl9Wm4
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Upatre family
-
Executes dropped EXE 1 IoCs
pid Process 1220 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe 1908 14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1220 1908 14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe 30 PID 1908 wrote to memory of 1220 1908 14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe 30 PID 1908 wrote to memory of 1220 1908 14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe 30 PID 1908 wrote to memory of 1220 1908 14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe"C:\Users\Admin\AppData\Local\Temp\14378ceb6b754b49b2a5ffdfe1598c4cdff7723ffe67f65626cd5c3fd587c628N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:1220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5af81c29aaff14901c3be94aa39a545a2
SHA1b8f051dcaddb24e3ac41248c642da156ee6558c2
SHA2566fb2da31cac5fbfba418a64701dcf7e8c9729661c278f9142771707b6e9c22de
SHA5122a5d10e3c43fc0dc03e19179b461b3fe792bf10682d46bf2e355238b6d7b79f7d4384ce761b867fd041e81339dda6015c629914da40536a9d83a3cd01d37d5e2