Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
17-05-2021 02:27
Static task
static1
Behavioral task
behavioral1
Sample
c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426.exe
Resource
win10v20210410
General
-
Target
c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426.exe
-
Size
9KB
-
MD5
d4453574bad4731456d6db125d8ba726
-
SHA1
f46131a1299ecdd7cf24f74f8c621c5912022071
-
SHA256
c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426
-
SHA512
86de78ba082c4db8c6cd685551b4f1b54b19ebd206750cc7c1f75fccfb3a9760dd4ea9a33d955d6cbbbf0f31aba907ee4adaa7e8de78cd2ebc2157db944d3284
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 956 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4044 wrote to memory of 956 4044 c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426.exe 74 PID 4044 wrote to memory of 956 4044 c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426.exe 74 PID 4044 wrote to memory of 956 4044 c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426.exe"C:\Users\Admin\AppData\Local\Temp\c528141fad80bea044834169047ce23baa6ae793c4a441b53f1b550c8ab72426.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:956
-