Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-05-2021 20:44
Static task
static1
Behavioral task
behavioral1
Sample
b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2.exe
Resource
win10v20210408
General
-
Target
b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2.exe
-
Size
33KB
-
MD5
fd94bc055cbbdfc573b3f58b050ca5ec
-
SHA1
64e8671876614892c9e0d91dca1c778f97f4a98b
-
SHA256
b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2
-
SHA512
4b6e6487b1367834216b11b56e3ece0c89880ce2bf6675180139131daa67b47c006fb1f606f9eb936691d91d5cc13b7b0fc53248b85455901da0c88923a2621e
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 944 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 584 wrote to memory of 944 584 b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2.exe 77 PID 584 wrote to memory of 944 584 b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2.exe 77 PID 584 wrote to memory of 944 584 b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2.exe"C:\Users\Admin\AppData\Local\Temp\b14841fde824584aeda9f6efdd8324b165e999cf1f1c1b6c933a02ce11d1e4e2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:944
-