Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 04:35
Static task
static1
Behavioral task
behavioral1
Sample
minor.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
minor.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
minor.exe
-
Size
27KB
-
MD5
cc41876131457380518803a6daed9fe3
-
SHA1
352b01bbd7063ebbd3aedbe8e35408fd51584b1a
-
SHA256
db57d70cb349c8db6a0fd0a43a7e2ac68edc258457c9cb6b6dbd19a3e348195c
-
SHA512
284aee559d4734b3ff0732f0e693070498b895cf95de687bc033c113ee195a768d763c05661eaf01171891f517cc27214e1a1e41cfe2900d9a9366dc762c5b25
Score
10/10
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 4328 szgfw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation minor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4328 4568 minor.exe 80 PID 4568 wrote to memory of 4328 4568 minor.exe 80 PID 4568 wrote to memory of 4328 4568 minor.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\minor.exe"C:\Users\Admin\AppData\Local\Temp\minor.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4328
-