Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 14:22 UTC

General

  • Target

    1aaa5ddc1462571d4c61468d09b156c89b90e11ae0cc3f118ac6c13e0a063e11.exe

  • Size

    36KB

  • MD5

    fd4760a9fb1021ba13cec18c9ebe2f77

  • SHA1

    1411fde4382cc08b591e9c080299364e384da2d5

  • SHA256

    1aaa5ddc1462571d4c61468d09b156c89b90e11ae0cc3f118ac6c13e0a063e11

  • SHA512

    d0d3b64ba1102e0c744ddc3b94a20c4b85578added639bfec7a1e7fb8793e31a940c59b4dcfdb0da18dfdeb9156a243c4697b642b38df16a974a88a4e4e5ab67

  • SSDEEP

    768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rCBsPGTWikx:GY9jw/dUT62rGdiUOWWrC6P6TW

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Upatre family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aaa5ddc1462571d4c61468d09b156c89b90e11ae0cc3f118ac6c13e0a063e11.exe
    "C:\Users\Admin\AppData\Local\Temp\1aaa5ddc1462571d4c61468d09b156c89b90e11ae0cc3f118ac6c13e0a063e11.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    36KB

    MD5

    9216d29715a35ea7fa62177f13b6b49f

    SHA1

    11e61a6c05a9543a1227fc9e461f7d4e6ba22868

    SHA256

    fc9add5a82f76ae84a54888808744773e91ed218aafbc8be7800e1d224c99ec5

    SHA512

    6e9650e243ee0b0942373011e8d469191fe460675ab806efe6a293ab6db9be2ac287fc413925eb095f85f83da6d24f9f226d698e3604e5a65088b4ebbbc6afe1

  • memory/2076-12-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2228-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2228-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.