Analysis Overview
SHA256
89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c
Threat Level: Known bad
The file 89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c was found to be: Known bad.
Malicious Activity Summary
Upatre
Executes dropped EXE
Loads dropped DLL
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-05-09 17:27
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-05-09 17:27
Reported
2021-05-09 19:57
Platform
win7v20210410
Max time kernel
150s
Max time network
105s
Command Line
Signatures
Upatre
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\szgfw.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2020 wrote to memory of 1816 | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 2020 wrote to memory of 1816 | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 2020 wrote to memory of 1816 | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 2020 wrote to memory of 1816 | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe
"C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe"
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 172.217.20.110:80 | tcp | |
| N/A | 172.217.20.110:80 | tcp | |
| N/A | 172.217.20.110:80 | tcp |
Files
memory/2020-60-0x0000000076281000-0x0000000076283000-memory.dmp
\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | 79ce1226dc23d001a0b52c2629403e9c |
| SHA1 | df04f6ab658416e3c43816eb75c114dd64925c0d |
| SHA256 | 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d |
| SHA512 | 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def |
\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | 79ce1226dc23d001a0b52c2629403e9c |
| SHA1 | df04f6ab658416e3c43816eb75c114dd64925c0d |
| SHA256 | 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d |
| SHA512 | 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def |
memory/1816-63-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | 79ce1226dc23d001a0b52c2629403e9c |
| SHA1 | df04f6ab658416e3c43816eb75c114dd64925c0d |
| SHA256 | 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d |
| SHA512 | 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def |
memory/2020-66-0x00000000001B0000-0x00000000001B1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | 79ce1226dc23d001a0b52c2629403e9c |
| SHA1 | df04f6ab658416e3c43816eb75c114dd64925c0d |
| SHA256 | 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d |
| SHA512 | 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def |
Analysis: behavioral2
Detonation Overview
Submitted
2021-05-09 17:27
Reported
2021-05-09 19:57
Platform
win10v20210408
Max time kernel
153s
Max time network
116s
Command Line
Signatures
Upatre
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\szgfw.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 900 wrote to memory of 192 | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 900 wrote to memory of 192 | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 900 wrote to memory of 192 | N/A | C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe
"C:\Users\Admin\AppData\Local\Temp\89381ed923ce0bbbfa4319e353c7b0e12e7856d89312a6963917d0545dab031c.exe"
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
Network
Files
memory/900-114-0x0000000000980000-0x0000000000981000-memory.dmp
memory/192-115-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | 79ce1226dc23d001a0b52c2629403e9c |
| SHA1 | df04f6ab658416e3c43816eb75c114dd64925c0d |
| SHA256 | 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d |
| SHA512 | 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def |
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | 79ce1226dc23d001a0b52c2629403e9c |
| SHA1 | df04f6ab658416e3c43816eb75c114dd64925c0d |
| SHA256 | 898d9423f7ef205f7e96b5fc77cffacba23abfb08eef9cc5657b23f75858175d |
| SHA512 | 7af49881c97b85fdb4f853fef592ebe8fef040548461bc136bbb7ad760dbec51cca5599f11b7ca38f599de9572e7786a45a4a6ca8f755be633933ebf6d418def |