Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    05-05-2021 00:04

General

  • Target

    5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe

  • Size

    34KB

  • MD5

    d553e14e849b57a0415b6cbcabe67e32

  • SHA1

    53920a857238e76446873365bffdbfe241c74fbc

  • SHA256

    5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f

  • SHA512

    2b5a5529db712e4729930b86f0de049627207ce261a146d6bd679a9627b7e0090709dbab8fbaac7f9300e6e56a53dc3f9c15336c006bb0452a6eba15e1b39921

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe
    "C:\Users\Admin\AppData\Local\Temp\5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:1408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1088-59-0x00000000753B1000-0x00000000753B3000-memory.dmp

    Filesize

    8KB

  • memory/1088-65-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB