Analysis
-
max time kernel
150s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
11-05-2021 11:24
Static task
static1
Behavioral task
behavioral1
Sample
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe
Resource
win10v20210410
General
-
Target
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe
-
Size
33KB
-
MD5
48bd4a72b859ab186bb7c8e6263850dd
-
SHA1
c7ab0a409d14344c3b225170177f1d0e2d15cc88
-
SHA256
73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31
-
SHA512
1734b5d6cfaa346983103906cf5cbb266599176becd0b79110bd047dfcdd870005e56dc75d6e3886f549f77ea33d0497933ac204273d0637497cb9196c78ea2e
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 1696 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1696 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe 29 PID 2000 wrote to memory of 1696 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe 29 PID 2000 wrote to memory of 1696 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe 29 PID 2000 wrote to memory of 1696 2000 73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe"C:\Users\Admin\AppData\Local\Temp\73a2f7ffb4bba1b2a871db0b739a91bb5855843584b1875c0631c96fa56afc31.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:1696
-