Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-05-2021 20:36
Static task
static1
Behavioral task
behavioral1
Sample
8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054.exe
Resource
win10v20210410
General
-
Target
8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054.exe
-
Size
29KB
-
MD5
e1b272e706713435dd3744c91f319286
-
SHA1
0f11fb5cc6e5fa16da99ea30257ca5e9b75c2d1e
-
SHA256
8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054
-
SHA512
5788761c5a389f35f627faef512c8f51859a8b050c9d6b413e38004616a93322a0938ebf2c378a71b518b9ac3dbc4a9c8bd6e9d0153b926e28666fb3213aab0c
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2932 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3952 wrote to memory of 2932 3952 8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054.exe 77 PID 3952 wrote to memory of 2932 3952 8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054.exe 77 PID 3952 wrote to memory of 2932 3952 8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054.exe"C:\Users\Admin\AppData\Local\Temp\8546ea8b1504e11b0cc6fe444a733c572b142ea0931008414dfd6f7d011a2054.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2932
-