Analysis
-
max time kernel
150s -
max time network
67s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-05-2021 06:28
Static task
static1
Behavioral task
behavioral1
Sample
61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5.exe
Resource
win10v20210408
General
-
Target
61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5.exe
-
Size
42KB
-
MD5
1d3b373f1480af47b358d3c8d004b269
-
SHA1
5d5b567a01a8d8264953da2d22561efca1809a82
-
SHA256
61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5
-
SHA512
d265f0ddda4b687b71f72b9dfd3fba3432b7ed3670af6a230b55f8419474c87648a7c704be248b5147932ccd91c90c776f2239c7a01bb9ba299e0f8b1398f250
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 4088 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 624 wrote to memory of 4088 624 61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5.exe 77 PID 624 wrote to memory of 4088 624 61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5.exe 77 PID 624 wrote to memory of 4088 624 61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5.exe"C:\Users\Admin\AppData\Local\Temp\61edfe037eec63c48b03641caee8a19e68f5987925c48c1b7b45dbc5fc3956d5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4088
-