Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-05-2021 19:36
Static task
static1
Behavioral task
behavioral1
Sample
3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe
Resource
win10v20210408
General
-
Target
3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe
-
Size
30KB
-
MD5
e7412fbd2a0809d22a08caefb982dc1c
-
SHA1
1ed6bbdd2f2487aff5dfaac2ed82d19621018c4a
-
SHA256
3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19
-
SHA512
b59750b413651759b60fd91eef6cd6a83a36e9fb053033d5ce0ec19b237a0c02d887b0d6e3be5616642b16ba8106d7fc07d38d0496da59d702d5fefddfbaee6c
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 1328 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1096 3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe 1096 3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1328 1096 3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe 29 PID 1096 wrote to memory of 1328 1096 3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe 29 PID 1096 wrote to memory of 1328 1096 3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe 29 PID 1096 wrote to memory of 1328 1096 3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe"C:\Users\Admin\AppData\Local\Temp\3b74f9386a3733e782c3c1451cba710af21497bdcb0e49073d6e8bd7d4b3ed19.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:1328
-