Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    18-05-2021 06:03

General

  • Target

    2ce2e7264e153c549fbe0311b0433d7443e8e875875725ce6eb802074d4241ce.exe

  • Size

    31KB

  • MD5

    08cba8ff09d5daedad7b63db813a816f

  • SHA1

    cc273e5377560397ffa1e1696d068eac1f989feb

  • SHA256

    2ce2e7264e153c549fbe0311b0433d7443e8e875875725ce6eb802074d4241ce

  • SHA512

    f85a3c6d617b9a2ffb6e923fdd4f1135fbc085bd8e5a3376516f331f2e3403fda0921835c93c9006cc0c537ca0b93e097ca1fd5dc835f8a631f7b37d6225d973

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ce2e7264e153c549fbe0311b0433d7443e8e875875725ce6eb802074d4241ce.exe
    "C:\Users\Admin\AppData\Local\Temp\2ce2e7264e153c549fbe0311b0433d7443e8e875875725ce6eb802074d4241ce.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/656-114-0x0000000000410000-0x000000000055A000-memory.dmp

    Filesize

    1.3MB

  • memory/2056-118-0x0000000000550000-0x000000000069A000-memory.dmp

    Filesize

    1.3MB