Analysis
-
max time kernel
157s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14-02-2022 08:30
Static task
static1
Behavioral task
behavioral1
Sample
0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe
Resource
win10v2004-en-20220112
General
-
Target
0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe
-
Size
36KB
-
MD5
dbdcc42cd1c662d8e3b984c29ac59a87
-
SHA1
120c239072aaf09c31c81840a4a314201af9ff3e
-
SHA256
0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e
-
SHA512
3acd419cf3e46351f0e6e8ba235a21cf05145d73f7d26c22e909b262b547c1e3140a37484065337b0efad45ed9d3a71512d0a7f0e372676d0cf54637c3383e3a
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 848 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1212 0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe 1212 0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1212 wrote to memory of 848 1212 0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe 27 PID 1212 wrote to memory of 848 1212 0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe 27 PID 1212 wrote to memory of 848 1212 0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe 27 PID 1212 wrote to memory of 848 1212 0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe"C:\Users\Admin\AppData\Local\Temp\0a3c250e9d085ffb1010bdf8f30a78b41617f1bd9780218edcfef00605f9f01e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:848
-