Analysis Overview
SHA256
335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439
Threat Level: Known bad
The file 335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439 was found to be: Known bad.
Malicious Activity Summary
Upatre
Executes dropped EXE
Loads dropped DLL
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-05-11 14:17
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-05-11 14:17
Reported
2021-05-11 21:19
Platform
win7v20210410
Max time kernel
151s
Max time network
129s
Command Line
Signatures
Upatre
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\szgfw.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1092 wrote to memory of 1552 | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 1092 wrote to memory of 1552 | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 1092 wrote to memory of 1552 | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 1092 wrote to memory of 1552 | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe
"C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe"
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 185.175.44.167:5655 | tcp |
Files
memory/1092-59-0x0000000076E11000-0x0000000076E13000-memory.dmp
\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | bd32503a6f3bd6881483f792c89ab8e4 |
| SHA1 | 800a5ab8d287ddd6f318225f5b9137fe3ed9360c |
| SHA256 | 65ab681637de833f8fc31aaeda08e0970a6151c77e9666ff02c7ac37310cb989 |
| SHA512 | 8d268189417c618f0fe22bb003979db8882ccf9d63424e1929cdd3cf3a29394fd373f4d609e29ddf6eea982e5f5703a76f2585af55856b6333f1380b1981444d |
\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | bd32503a6f3bd6881483f792c89ab8e4 |
| SHA1 | 800a5ab8d287ddd6f318225f5b9137fe3ed9360c |
| SHA256 | 65ab681637de833f8fc31aaeda08e0970a6151c77e9666ff02c7ac37310cb989 |
| SHA512 | 8d268189417c618f0fe22bb003979db8882ccf9d63424e1929cdd3cf3a29394fd373f4d609e29ddf6eea982e5f5703a76f2585af55856b6333f1380b1981444d |
memory/1552-62-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | bd32503a6f3bd6881483f792c89ab8e4 |
| SHA1 | 800a5ab8d287ddd6f318225f5b9137fe3ed9360c |
| SHA256 | 65ab681637de833f8fc31aaeda08e0970a6151c77e9666ff02c7ac37310cb989 |
| SHA512 | 8d268189417c618f0fe22bb003979db8882ccf9d63424e1929cdd3cf3a29394fd373f4d609e29ddf6eea982e5f5703a76f2585af55856b6333f1380b1981444d |
memory/1092-65-0x0000000000230000-0x0000000000231000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | bd32503a6f3bd6881483f792c89ab8e4 |
| SHA1 | 800a5ab8d287ddd6f318225f5b9137fe3ed9360c |
| SHA256 | 65ab681637de833f8fc31aaeda08e0970a6151c77e9666ff02c7ac37310cb989 |
| SHA512 | 8d268189417c618f0fe22bb003979db8882ccf9d63424e1929cdd3cf3a29394fd373f4d609e29ddf6eea982e5f5703a76f2585af55856b6333f1380b1981444d |
Analysis: behavioral2
Detonation Overview
Submitted
2021-05-11 14:17
Reported
2021-05-11 21:19
Platform
win10v20210408
Max time kernel
149s
Max time network
90s
Command Line
Signatures
Upatre
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\szgfw.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 904 wrote to memory of 1436 | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 904 wrote to memory of 1436 | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 904 wrote to memory of 1436 | N/A | C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe
"C:\Users\Admin\AppData\Local\Temp\335b0ba1fcee84e9d40ac0a7dec7d3f938fd38dfe77b163f78107a6dcd42b439.exe"
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 172.217.20.110:80 | tcp | |
| N/A | 172.217.20.110:80 | tcp |
Files
memory/904-114-0x00000000001D0000-0x00000000001D1000-memory.dmp
memory/1436-115-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | bd32503a6f3bd6881483f792c89ab8e4 |
| SHA1 | 800a5ab8d287ddd6f318225f5b9137fe3ed9360c |
| SHA256 | 65ab681637de833f8fc31aaeda08e0970a6151c77e9666ff02c7ac37310cb989 |
| SHA512 | 8d268189417c618f0fe22bb003979db8882ccf9d63424e1929cdd3cf3a29394fd373f4d609e29ddf6eea982e5f5703a76f2585af55856b6333f1380b1981444d |
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | bd32503a6f3bd6881483f792c89ab8e4 |
| SHA1 | 800a5ab8d287ddd6f318225f5b9137fe3ed9360c |
| SHA256 | 65ab681637de833f8fc31aaeda08e0970a6151c77e9666ff02c7ac37310cb989 |
| SHA512 | 8d268189417c618f0fe22bb003979db8882ccf9d63424e1929cdd3cf3a29394fd373f4d609e29ddf6eea982e5f5703a76f2585af55856b6333f1380b1981444d |
memory/1436-118-0x0000000000410000-0x000000000055A000-memory.dmp