Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17-10-2022 21:10
Static task
static1
Behavioral task
behavioral1
Sample
ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe
Resource
win10v2004-20220812-en
General
-
Target
ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe
-
Size
8KB
-
MD5
bf84c88e9799da266f64b145ed624a96
-
SHA1
944f58671ff9da706129e2009723340ba266136e
-
SHA256
ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f
-
SHA512
13fb049097550b722d58445f8c29cff5da6f5765e469ffe84db78ba094f8bca595537cd53d21b118633f272b6b4bb80a9ac7aef163c396b23d0f12b0ffc54899
-
SSDEEP
192:9mUWKs/nLnKfzSh2U95Qd96rD5IuEvI4fcii:6K+zKfzQz9v5jGnch
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 992 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 560 ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe 560 ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 992 560 ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe 28 PID 560 wrote to memory of 992 560 ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe 28 PID 560 wrote to memory of 992 560 ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe 28 PID 560 wrote to memory of 992 560 ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe"C:\Users\Admin\AppData\Local\Temp\ab0ab9568083056cdd54ca4d46c53bc9e309eebe3e19222b59989af43d4be31f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD55cf62b1c775cb0e743ac26b8e9657895
SHA1270d41596578cb42a2b563cb9d8e89a6b9340fdd
SHA256aab8c03a6e03b9c4456e5125c49847ce4c93c1e16e7b5b29aa1aeea8af17ab25
SHA5122c21bf4e4128a4da1cc791ce5a63ee9f5bf15877b0179dcc11e26439168edb39fc6ff37a19104db8e02407d3da191928add8717c896c3df800396090c4c94ddf
-
Filesize
8KB
MD55cf62b1c775cb0e743ac26b8e9657895
SHA1270d41596578cb42a2b563cb9d8e89a6b9340fdd
SHA256aab8c03a6e03b9c4456e5125c49847ce4c93c1e16e7b5b29aa1aeea8af17ab25
SHA5122c21bf4e4128a4da1cc791ce5a63ee9f5bf15877b0179dcc11e26439168edb39fc6ff37a19104db8e02407d3da191928add8717c896c3df800396090c4c94ddf
-
Filesize
8KB
MD55cf62b1c775cb0e743ac26b8e9657895
SHA1270d41596578cb42a2b563cb9d8e89a6b9340fdd
SHA256aab8c03a6e03b9c4456e5125c49847ce4c93c1e16e7b5b29aa1aeea8af17ab25
SHA5122c21bf4e4128a4da1cc791ce5a63ee9f5bf15877b0179dcc11e26439168edb39fc6ff37a19104db8e02407d3da191928add8717c896c3df800396090c4c94ddf
-
Filesize
8KB
MD55cf62b1c775cb0e743ac26b8e9657895
SHA1270d41596578cb42a2b563cb9d8e89a6b9340fdd
SHA256aab8c03a6e03b9c4456e5125c49847ce4c93c1e16e7b5b29aa1aeea8af17ab25
SHA5122c21bf4e4128a4da1cc791ce5a63ee9f5bf15877b0179dcc11e26439168edb39fc6ff37a19104db8e02407d3da191928add8717c896c3df800396090c4c94ddf