Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
09-05-2021 15:05
Static task
static1
Behavioral task
behavioral1
Sample
2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe
Resource
win10v20210408
General
-
Target
2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe
-
Size
37KB
-
MD5
bd5c0741e738d306131f66392a01cf9a
-
SHA1
0798add046a8c30823fe9dd857bd159912d7570b
-
SHA256
2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4
-
SHA512
7e061a334e1ee743828e60fdd4ce901b785a15c010e75763922d2aa05e2bef51919d00e2594240d065d1b3a5fad3b43b6c7498b5e6142cefc0ef88722c341179
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 756 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1920 2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe 1920 2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 756 1920 2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe 29 PID 1920 wrote to memory of 756 1920 2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe 29 PID 1920 wrote to memory of 756 1920 2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe 29 PID 1920 wrote to memory of 756 1920 2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe"C:\Users\Admin\AppData\Local\Temp\2b8e9a78503b1181fd5ba6f41a4dc569938027d9c1fa8a89485daf1f261d85d4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:756
-