Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
09-05-2021 15:52
Static task
static1
Behavioral task
behavioral1
Sample
c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839.exe
Resource
win10v20210410
General
-
Target
c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839.exe
-
Size
34KB
-
MD5
ea08eda0ebfe0b8d19eba09b0b10606a
-
SHA1
0d40e71473f63c4af1e3290fa54c7e99340595ef
-
SHA256
c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839
-
SHA512
4277efb532aae4bc783a199d45ba9203910c72b0ca13c989ca706fe311d3f2342293ac8be7a27d2d5647d9c73c90e76c5c7f9b84d320ff1389c3a8a05714bd45
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 3444 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3444 2112 c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839.exe 79 PID 2112 wrote to memory of 3444 2112 c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839.exe 79 PID 2112 wrote to memory of 3444 2112 c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839.exe"C:\Users\Admin\AppData\Local\Temp\c09b3fb462ff1463c60152469d0dc8a51a21166dc6c98112c36978e1ae079839.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:3444
-