Analysis
-
max time kernel
150s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-05-2021 02:16
Static task
static1
Behavioral task
behavioral1
Sample
8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe
Resource
win10v20210408
General
-
Target
8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe
-
Size
32KB
-
MD5
43a2440b2d1ef39919c96f96daab6d21
-
SHA1
a55c3ca1ffa372e23f43dc5fcb7723cc0f60b92b
-
SHA256
8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872
-
SHA512
3286e7700e2ee395a9640322fbf283d709fa8d38dad824c9ec2ed05a476ffa27c1c42504c354e7a2b215003126abad4610f30c303f43a56ecee3ada58cb11600
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 1328 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1072 8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe 1072 8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1328 1072 8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe 29 PID 1072 wrote to memory of 1328 1072 8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe 29 PID 1072 wrote to memory of 1328 1072 8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe 29 PID 1072 wrote to memory of 1328 1072 8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe"C:\Users\Admin\AppData\Local\Temp\8c3057697545bd51d9a2db67fa57c6479d1dcf0b438400c07976c86f9a65b872.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:1328
-