Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-05-2021 17:35
Static task
static1
Behavioral task
behavioral1
Sample
de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe
Resource
win10v20210410
General
-
Target
de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe
-
Size
151KB
-
MD5
40d3c1a78e678a50daf2b0da09e98113
-
SHA1
d62962c94ac8aa9d59b2afb92f6722654d535ae7
-
SHA256
de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111
-
SHA512
6460d6e4e37645f661d91463581375bbfe17c06b8f4c0f02f74e012abf81c1d7af5b35db5e081a6a445173894be1fe61dbde1d9ff7a0ba3f26129e6722627101
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 824 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 336 de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe 336 de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 336 wrote to memory of 824 336 de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe 29 PID 336 wrote to memory of 824 336 de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe 29 PID 336 wrote to memory of 824 336 de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe 29 PID 336 wrote to memory of 824 336 de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe"C:\Users\Admin\AppData\Local\Temp\de16bf872e86b5f82d0163db52362384a29a41ea2bd1cbdfe915c71b22ae3111.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:824
-