Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-05-2021 11:28
Static task
static1
Behavioral task
behavioral1
Sample
c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32.exe
Resource
win10v20210410
General
-
Target
c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32.exe
-
Size
42KB
-
MD5
14e24fce31cb0d70966a812e036ab904
-
SHA1
64522c0c2eb319eecc2b9b58fdff04d07aa8b82c
-
SHA256
c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32
-
SHA512
18ba55c2f2252ac1128693e5ace9c820685a48e30433e9dae352196c3f6788dcac31a78fa5c4dcb30cea6513fa922d09a69ce98b56436550d1157acee43eda62
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2308 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2308 2116 c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32.exe 78 PID 2116 wrote to memory of 2308 2116 c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32.exe 78 PID 2116 wrote to memory of 2308 2116 c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32.exe"C:\Users\Admin\AppData\Local\Temp\c05b648df04d3268bc931df85dfd1a16585341e17ce2b362df9287de836cfe32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2308
-