Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-05-2021 00:04
Static task
static1
Behavioral task
behavioral1
Sample
5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe
Resource
win10v20210408
General
-
Target
5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe
-
Size
34KB
-
MD5
d553e14e849b57a0415b6cbcabe67e32
-
SHA1
53920a857238e76446873365bffdbfe241c74fbc
-
SHA256
5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f
-
SHA512
2b5a5529db712e4729930b86f0de049627207ce261a146d6bd679a9627b7e0090709dbab8fbaac7f9300e6e56a53dc3f9c15336c006bb0452a6eba15e1b39921
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 1408 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1088 5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe 1088 5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1408 1088 5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe 29 PID 1088 wrote to memory of 1408 1088 5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe 29 PID 1088 wrote to memory of 1408 1088 5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe 29 PID 1088 wrote to memory of 1408 1088 5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe"C:\Users\Admin\AppData\Local\Temp\5815b7ca03933a7c4cbe4b5e3c4d9bcfdf2944efeb90d8f0d70c20ba7df2de4f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:1408
-