Analysis

  • max time kernel
    149s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    18-05-2021 06:03

General

  • Target

    2ce2e7264e153c549fbe0311b0433d7443e8e875875725ce6eb802074d4241ce.exe

  • Size

    31KB

  • MD5

    08cba8ff09d5daedad7b63db813a816f

  • SHA1

    cc273e5377560397ffa1e1696d068eac1f989feb

  • SHA256

    2ce2e7264e153c549fbe0311b0433d7443e8e875875725ce6eb802074d4241ce

  • SHA512

    f85a3c6d617b9a2ffb6e923fdd4f1135fbc085bd8e5a3376516f331f2e3403fda0921835c93c9006cc0c537ca0b93e097ca1fd5dc835f8a631f7b37d6225d973

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ce2e7264e153c549fbe0311b0433d7443e8e875875725ce6eb802074d4241ce.exe
    "C:\Users\Admin\AppData\Local\Temp\2ce2e7264e153c549fbe0311b0433d7443e8e875875725ce6eb802074d4241ce.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1984-59-0x0000000075AD1000-0x0000000075AD3000-memory.dmp

    Filesize

    8KB

  • memory/1984-65-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB