Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
17/05/2021, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe
Resource
win10v20210408
General
-
Target
7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe
-
Size
602KB
-
MD5
0caddb2ff4cf3915676a0f1119cc5048
-
SHA1
571570f454c118970800ab24e629766e3c7f9259
-
SHA256
7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69
-
SHA512
757ed6bcdc4a4240b7d83b2d603132d4bd6aed4a9a3eb93b2a2fd474393d158c89e1378010b12de1c9b84e6537301318e21c17d0f15422260baaf14b1eae49c8
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2860 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 636 wrote to memory of 2860 636 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe 77 PID 636 wrote to memory of 2860 636 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe 77 PID 636 wrote to memory of 2860 636 7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe"C:\Users\Admin\AppData\Local\Temp\7fa37440e0322c2a1bf3f4bbf272afc6d74e6ca68a8fde08467b95bd8ab38b69.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2860
-