Malware Analysis Report

2024-10-23 21:06

Sample ID 210509-jnfe6zsstx
Target 89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c
SHA256 89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c
Tags
upatre downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c

Threat Level: Known bad

The file 89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c was found to be: Known bad.

Malicious Activity Summary

upatre downloader

Upatre

Executes dropped EXE

Loads dropped DLL

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2021-05-09 17:27

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-05-09 17:27

Reported

2021-05-09 19:57

Platform

win7v20210410

Max time kernel

150s

Max time network

105s

Command Line

"C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe

"C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe"

C:\Users\Admin\AppData\Local\Temp\szgfw.exe

"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"

Network

Country Destination Domain Proto
N/A 172.217.20.110:80 tcp
N/A 172.217.20.110:80 tcp
N/A 172.217.20.110:80 tcp

Files

memory/2020-60-0x0000000076281000-0x0000000076283000-memory.dmp

\Users\Admin\AppData\Local\Temp\szgfw.exe

MD5 79ce1226dc23d001a0b52c2629403e9c
SHA1 df04f6ab658416e3c43816eb75c114dd64925c0d
SHA256 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d
SHA512 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def

\Users\Admin\AppData\Local\Temp\szgfw.exe

MD5 79ce1226dc23d001a0b52c2629403e9c
SHA1 df04f6ab658416e3c43816eb75c114dd64925c0d
SHA256 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d
SHA512 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def

memory/1816-63-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\szgfw.exe

MD5 79ce1226dc23d001a0b52c2629403e9c
SHA1 df04f6ab658416e3c43816eb75c114dd64925c0d
SHA256 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d
SHA512 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def

memory/2020-66-0x00000000001B0000-0x00000000001B1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\szgfw.exe

MD5 79ce1226dc23d001a0b52c2629403e9c
SHA1 df04f6ab658416e3c43816eb75c114dd64925c0d
SHA256 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d
SHA512 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def

Analysis: behavioral2

Detonation Overview

Submitted

2021-05-09 17:27

Reported

2021-05-09 19:57

Platform

win10v20210408

Max time kernel

153s

Max time network

116s

Command Line

"C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe

"C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe"

C:\Users\Admin\AppData\Local\Temp\szgfw.exe

"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"

Network

N/A

Files

memory/900-114-0x0000000000980000-0x0000000000981000-memory.dmp

memory/192-115-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\szgfw.exe

MD5 79ce1226dc23d001a0b52c2629403e9c
SHA1 df04f6ab658416e3c43816eb75c114dd64925c0d
SHA256 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d
SHA512 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def

C:\Users\Admin\AppData\Local\Temp\szgfw.exe

MD5 79ce1226dc23d001a0b52c2629403e9c
SHA1 df04f6ab658416e3c43816eb75c114dd64925c0d
SHA256 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d
SHA512 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def