Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 04:31

General

  • Target

    62c41646e1830765d7451a6756a1c3dd10bb2712ac1d650d5c644490e298d9d1.exe

  • Size

    14KB

  • MD5

    7863b6f66527338c59735bfe4926a86f

  • SHA1

    1949a4ad8e9e30cce6fb0da705649720a16597b3

  • SHA256

    62c41646e1830765d7451a6756a1c3dd10bb2712ac1d650d5c644490e298d9d1

  • SHA512

    4c2cde10a4da36434d59a3844e20f9d909d621690b89f586a0df71e22fb03a2e8f2ddc28f2352b8c4fd283e411f6d86bb22fde23986e5775984ff7a555decb95

  • SSDEEP

    384:6K+dKfzQHxFxRmyja4QhiP7UlY/pjKhYsKUAylUmWmtssH0:v+dAURFxna4QAPQlYghxKUAyl9WmHH0

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Upatre family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62c41646e1830765d7451a6756a1c3dd10bb2712ac1d650d5c644490e298d9d1.exe
    "C:\Users\Admin\AppData\Local\Temp\62c41646e1830765d7451a6756a1c3dd10bb2712ac1d650d5c644490e298d9d1.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    14KB

    MD5

    c575b43c8e2e8013c0770347111747bc

    SHA1

    04f04c0d9b813ca962c035b1d9aa46721d7edb7b

    SHA256

    24b2ef5a3984582ecc2e55746bbad407abfe9a08d8a13af92c3440b2b1e15fb7

    SHA512

    e7baebbb70d0829a0c1d5823abc6d8cafc29b336a4186ec43423ec9297aedf7f99e0710a81c3c2324bf3addcfb95dea3f4793abc2c679d5ea0b7040a3a442bbc