Analysis
-
max time kernel
150s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
11-05-2021 11:24
Static task
static1
Behavioral task
behavioral1
Sample
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe
Resource
win10v20210410
General
-
Target
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe
-
Size
33KB
-
MD5
48bd4a72b859ab186bb7c8e6263850dd
-
SHA1
c7ab0a409d14344c3b225170177f1d0e2d15cc88
-
SHA256
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31
-
SHA512
1734b5d6cfaa346983103906cf5cbb266599176becd0b79110bd047dfcdd870005e56dc75d6e3886f549f77ea33d0497933ac204273d0637497cb9196c78ea2e
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
Processes:
szgfw.exepid process 1696 szgfw.exe -
Loads dropped DLL 2 IoCs
Processes:
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exepid process 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exedescription pid process target process PID 2000 wrote to memory of 1696 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe szgfw.exe PID 2000 wrote to memory of 1696 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe szgfw.exe PID 2000 wrote to memory of 1696 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe szgfw.exe PID 2000 wrote to memory of 1696 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe szgfw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe"C:\Users\Admin\AppData\Local\Temp\73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:1696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
554fa38e928118d598f1c51ab9518eaf
SHA15872a38a7c0b08abb76fb486f609e0c44288800c
SHA256775ee57e17b34fecf609945351990b3fc09864bbbecc3d97c048a4385420761b
SHA51213b20dca79448d453eb3066b3ea30617d28eac7bb6394867d19ab43e99f0323b60381081083685cb007ded1c6bdbcba6b1efbfcc67ebad41b547539c4a7c584d
-
MD5
554fa38e928118d598f1c51ab9518eaf
SHA15872a38a7c0b08abb76fb486f609e0c44288800c
SHA256775ee57e17b34fecf609945351990b3fc09864bbbecc3d97c048a4385420761b
SHA51213b20dca79448d453eb3066b3ea30617d28eac7bb6394867d19ab43e99f0323b60381081083685cb007ded1c6bdbcba6b1efbfcc67ebad41b547539c4a7c584d
-
MD5
554fa38e928118d598f1c51ab9518eaf
SHA15872a38a7c0b08abb76fb486f609e0c44288800c
SHA256775ee57e17b34fecf609945351990b3fc09864bbbecc3d97c048a4385420761b
SHA51213b20dca79448d453eb3066b3ea30617d28eac7bb6394867d19ab43e99f0323b60381081083685cb007ded1c6bdbcba6b1efbfcc67ebad41b547539c4a7c584d
-
MD5
554fa38e928118d598f1c51ab9518eaf
SHA15872a38a7c0b08abb76fb486f609e0c44288800c
SHA256775ee57e17b34fecf609945351990b3fc09864bbbecc3d97c048a4385420761b
SHA51213b20dca79448d453eb3066b3ea30617d28eac7bb6394867d19ab43e99f0323b60381081083685cb007ded1c6bdbcba6b1efbfcc67ebad41b547539c4a7c584d