Analysis
-
max time kernel
4294210s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 04:36
Static task
static1
Behavioral task
behavioral1
Sample
minor.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
minor.exe
Resource
win10v2004-20220310-en
General
-
Target
minor.exe
-
Size
27KB
-
MD5
cc41876131457380518803a6daed9fe3
-
SHA1
352b01bbd7063ebbd3aedbe8e35408fd51584b1a
-
SHA256
db57d70cb349c8db6a0fd0a43a7e2ac68edc258457c9cb6b6dbd19a3e348195c
-
SHA512
284aee559d4734b3ff0732f0e693070498b895cf95de687bc033c113ee195a768d763c05661eaf01171891f517cc27214e1a1e41cfe2900d9a9366dc762c5b25
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
Processes:
szgfw.exepid process 2004 szgfw.exe -
Loads dropped DLL 2 IoCs
Processes:
minor.exepid process 1836 minor.exe 1836 minor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
minor.exedescription pid process target process PID 1836 wrote to memory of 2004 1836 minor.exe szgfw.exe PID 1836 wrote to memory of 2004 1836 minor.exe szgfw.exe PID 1836 wrote to memory of 2004 1836 minor.exe szgfw.exe PID 1836 wrote to memory of 2004 1836 minor.exe szgfw.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\szgfw.exeMD5
f56d46ed8815a79fd2fa2b3034d967d4
SHA19d95cba8ae9789c3ec11cba83c8348c249aee137
SHA25644081829904e47fbdaf5d62f60bfb6853489170bfd9ef074abd5a0ba4f9593a6
SHA5121f9e2520c61e33caa1bb623ac7fd263be013dfdac8fd0c757d80938a5691bd9bdc2b4bbc2699f78ab37f36369ddb034a8b8a59906e19c861b7fa92ec1774fed8
-
C:\Users\Admin\AppData\Local\Temp\szgfw.exeMD5
f56d46ed8815a79fd2fa2b3034d967d4
SHA19d95cba8ae9789c3ec11cba83c8348c249aee137
SHA25644081829904e47fbdaf5d62f60bfb6853489170bfd9ef074abd5a0ba4f9593a6
SHA5121f9e2520c61e33caa1bb623ac7fd263be013dfdac8fd0c757d80938a5691bd9bdc2b4bbc2699f78ab37f36369ddb034a8b8a59906e19c861b7fa92ec1774fed8
-
\Users\Admin\AppData\Local\Temp\szgfw.exeMD5
f56d46ed8815a79fd2fa2b3034d967d4
SHA19d95cba8ae9789c3ec11cba83c8348c249aee137
SHA25644081829904e47fbdaf5d62f60bfb6853489170bfd9ef074abd5a0ba4f9593a6
SHA5121f9e2520c61e33caa1bb623ac7fd263be013dfdac8fd0c757d80938a5691bd9bdc2b4bbc2699f78ab37f36369ddb034a8b8a59906e19c861b7fa92ec1774fed8
-
\Users\Admin\AppData\Local\Temp\szgfw.exeMD5
f56d46ed8815a79fd2fa2b3034d967d4
SHA19d95cba8ae9789c3ec11cba83c8348c249aee137
SHA25644081829904e47fbdaf5d62f60bfb6853489170bfd9ef074abd5a0ba4f9593a6
SHA5121f9e2520c61e33caa1bb623ac7fd263be013dfdac8fd0c757d80938a5691bd9bdc2b4bbc2699f78ab37f36369ddb034a8b8a59906e19c861b7fa92ec1774fed8
-
memory/1836-54-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/2004-57-0x0000000000000000-mapping.dmp