Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
15-07-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
virussign.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
virussign.exe
Resource
win10v2004-20220414-en
General
-
Target
virussign.exe
-
Size
32KB
-
MD5
1da5c915374dcdb32adeaa4d0fc61770
-
SHA1
fb8f9d14cb4b763b988060014f3779ead3cdf488
-
SHA256
7927df47c0c78ba6770caaf8ef282c6d2f6ccbb57aba77886c2bcad56a5e6082
-
SHA512
c6de5e7db7b04ca4349f12e6b51ec72bc46bbfb9741fb50eea13e97861051c3f4d293ba9b40ac2bb465cd5f6e741c124bb8fa3127874d655494652d68ea66020
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 972 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 776 virussign.exe 776 virussign.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 776 wrote to memory of 972 776 virussign.exe 27 PID 776 wrote to memory of 972 776 virussign.exe 27 PID 776 wrote to memory of 972 776 virussign.exe 27 PID 776 wrote to memory of 972 776 virussign.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.exe"C:\Users\Admin\AppData\Local\Temp\virussign.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD52ccf9b5558877472283aa3026317c59d
SHA12e00f62a4a6e81cc6a4049d7827a68b44a802614
SHA256017181a54226efded63c0d9b244b81a00df8e830138f93ac85a983a5fc83d26b
SHA51209cc5a392c34be80902d48df3edf7dc0f17dec7a96a444fec5acb5c1ee5845cb21e42f2941a8864db1c05cbb90c02d42f45e46a7ac0a0114ba7d40c1d22b400f
-
Filesize
32KB
MD52ccf9b5558877472283aa3026317c59d
SHA12e00f62a4a6e81cc6a4049d7827a68b44a802614
SHA256017181a54226efded63c0d9b244b81a00df8e830138f93ac85a983a5fc83d26b
SHA51209cc5a392c34be80902d48df3edf7dc0f17dec7a96a444fec5acb5c1ee5845cb21e42f2941a8864db1c05cbb90c02d42f45e46a7ac0a0114ba7d40c1d22b400f
-
Filesize
32KB
MD52ccf9b5558877472283aa3026317c59d
SHA12e00f62a4a6e81cc6a4049d7827a68b44a802614
SHA256017181a54226efded63c0d9b244b81a00df8e830138f93ac85a983a5fc83d26b
SHA51209cc5a392c34be80902d48df3edf7dc0f17dec7a96a444fec5acb5c1ee5845cb21e42f2941a8864db1c05cbb90c02d42f45e46a7ac0a0114ba7d40c1d22b400f
-
Filesize
32KB
MD52ccf9b5558877472283aa3026317c59d
SHA12e00f62a4a6e81cc6a4049d7827a68b44a802614
SHA256017181a54226efded63c0d9b244b81a00df8e830138f93ac85a983a5fc83d26b
SHA51209cc5a392c34be80902d48df3edf7dc0f17dec7a96a444fec5acb5c1ee5845cb21e42f2941a8864db1c05cbb90c02d42f45e46a7ac0a0114ba7d40c1d22b400f