Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/02/2025, 07:33

General

  • Target

    9260684f202848c0c64b4e1a8358eb5f603774411a240c9523f1a6927cc61045N.exe

  • Size

    7KB

  • MD5

    f53201c382dc5a3c8819b8c7b294a680

  • SHA1

    434d60962983c0bf7692c6621d304a519b8f5fc6

  • SHA256

    9260684f202848c0c64b4e1a8358eb5f603774411a240c9523f1a6927cc61045

  • SHA512

    8c0b9d390729a9da3a310ac30dcdb73c176862017d485ff06b557ab671e6b051620cbc711f88a007dee97f4c4fb363443c178ff3186dd842c1834b161f791c76

  • SSDEEP

    48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RsnnA7B8mOo4jUx7OtKGcEl/g:Z0v4mUWKh9ctgC1R8nKymV44ShJl/Xw

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Upatre family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9260684f202848c0c64b4e1a8358eb5f603774411a240c9523f1a6927cc61045N.exe
    "C:\Users\Admin\AppData\Local\Temp\9260684f202848c0c64b4e1a8358eb5f603774411a240c9523f1a6927cc61045N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:1040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    7KB

    MD5

    c598a413b86fc09cdabe6152a0833a7c

    SHA1

    570316374ab10b725c97f1468a9e6224b072718a

    SHA256

    4d58b0f356b3657aa78de7291b943e24655e089250ec4f9d957722081abcac53

    SHA512

    e1f8c4729815a60e6c5bb31a9f421ea0fa7b867c31711817913c7c0f9020edb24b479e7a55f3dab0045cd118adeca69d612a07ea3f3a3c668ab919bcdd1edde1