Analysis
-
max time kernel
153s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14/02/2022, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe
Resource
win10v2004-en-20220113
General
-
Target
3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe
-
Size
39KB
-
MD5
3029da1bc7e40fc66d049998d90c9fd5
-
SHA1
18449595e05528476a835c469ea8314a4ddc7e4a
-
SHA256
3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c
-
SHA512
3301d3e31d7864373a1a9309b41da6949dcf5bd9beb2b287505e42ce98796165d6140c3d0fda0f0963a890a230e8a2a3d16eaf987245def1579545a862d37d2b
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 268 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1660 3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe 1660 3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 268 1660 3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe 27 PID 1660 wrote to memory of 268 1660 3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe 27 PID 1660 wrote to memory of 268 1660 3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe 27 PID 1660 wrote to memory of 268 1660 3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe"C:\Users\Admin\AppData\Local\Temp\3ef858b1eb077cad768f0f11fb075ec4dd375546408a41404c7bc69e8916fe0c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:268
-