Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-05-2021 16:02
Static task
static1
Behavioral task
behavioral1
Sample
302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb.exe
Resource
win10v20210408
General
-
Target
302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb.exe
-
Size
29KB
-
MD5
21a33114a4dd14ad7a37a65bc24248bd
-
SHA1
092f1d89107001adf3708f4f648c9c6ffdd6c407
-
SHA256
302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb
-
SHA512
ed7a3c423846e470f62cc7cab2289508a5d8a213029ff207ab2e92e24e5d136de51905a681ed1f5105dffebca285914ca161142e677a5e1a8100d72ad2808820
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2712 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 656 wrote to memory of 2712 656 302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb.exe 76 PID 656 wrote to memory of 2712 656 302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb.exe 76 PID 656 wrote to memory of 2712 656 302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb.exe"C:\Users\Admin\AppData\Local\Temp\302539c81bfa7f8730fc8b34576d0fe220fbf99f983a1f62d3c2d279e0e45adb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2712
-