Analysis
-
max time kernel
149s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-05-2021 23:20
Static task
static1
Behavioral task
behavioral1
Sample
0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926.exe
Resource
win10v20210410
General
-
Target
0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926.exe
-
Size
29KB
-
MD5
e72dcea1208a3d5fcd3c1707a5adf637
-
SHA1
59d921470b797d4c53a9d92cf2ce03e03b3f18ea
-
SHA256
0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926
-
SHA512
420c64642c0b3394f9d61b37a8a700275fd7689b052f83ea755bd74db054ec84c18b7732d89777f5e3d5d28fb7f454d9c4c99bc6b4a114eddb32273ac6c332fc
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 3660 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3660 3904 0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926.exe 79 PID 3904 wrote to memory of 3660 3904 0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926.exe 79 PID 3904 wrote to memory of 3660 3904 0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926.exe"C:\Users\Admin\AppData\Local\Temp\0e782491428ce889bf3de1ef0f6a25f6a8765b593f0aa277c482f01b850d1926.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:3660
-