Analysis Overview
SHA256
41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef
Threat Level: Known bad
The file 41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef was found to be: Known bad.
Malicious Activity Summary
Upatre
Executes dropped EXE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-05-11 14:00
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-05-11 14:00
Reported
2021-05-11 20:48
Platform
win7v20210410
Max time kernel
3s
Max time network
130s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef.exe
"C:\Users\Admin\AppData\Local\Temp\41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 172.217.20.110:80 | tcp | |
| N/A | 172.217.20.110:80 | tcp | |
| N/A | 172.217.20.110:80 | tcp | |
| N/A | 172.217.20.110:80 | tcp |
Files
memory/752-59-0x0000000076661000-0x0000000076663000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-05-11 14:00
Reported
2021-05-11 20:48
Platform
win10v20210408
Max time kernel
151s
Max time network
137s
Command Line
Signatures
Upatre
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\szgfw.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 852 wrote to memory of 2912 | N/A | C:\Users\Admin\AppData\Local\Temp\41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 852 wrote to memory of 2912 | N/A | C:\Users\Admin\AppData\Local\Temp\41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
| PID 852 wrote to memory of 2912 | N/A | C:\Users\Admin\AppData\Local\Temp\41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef.exe | C:\Users\Admin\AppData\Local\Temp\szgfw.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef.exe
"C:\Users\Admin\AppData\Local\Temp\41a99b8fb73ebbba27d7baa76046d4f455dfbe4ddcf75b29dcc46cccdbd53eef.exe"
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
Network
Files
memory/852-114-0x00000000005F0000-0x00000000005F1000-memory.dmp
memory/2912-115-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | 19795c969ff8dec0ef5764b805cf5d94 |
| SHA1 | 4b5dfc311a5ee4f2b521ee2fe5232546946c1f94 |
| SHA256 | 12ed90a3620af8df5263a310cc7c59c506c754bc30ead2f0dcdbd8f706fa01a9 |
| SHA512 | 2da6fd68e3c35c73c0381915df9612f1f3ce8e48b13fbdb457b997d4afd27a18cd50085058f066af4771b41de45950f1fad5d575d48bdf8f0883b7b27c085ab7 |
C:\Users\Admin\AppData\Local\Temp\szgfw.exe
| MD5 | 19795c969ff8dec0ef5764b805cf5d94 |
| SHA1 | 4b5dfc311a5ee4f2b521ee2fe5232546946c1f94 |
| SHA256 | 12ed90a3620af8df5263a310cc7c59c506c754bc30ead2f0dcdbd8f706fa01a9 |
| SHA512 | 2da6fd68e3c35c73c0381915df9612f1f3ce8e48b13fbdb457b997d4afd27a18cd50085058f066af4771b41de45950f1fad5d575d48bdf8f0883b7b27c085ab7 |