Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2022 10:49

General

  • Target

    741/00f4be3e01896945696018522c22fac007dc7e0a116553268e2e0b6ab0a13fda.exe

  • Size

    24KB

  • MD5

    0557ca27de2898918d912cc9154fd906

  • SHA1

    cf6b72b4e54d8f75c05255393f0d4fc1201b5a3d

  • SHA256

    00f4be3e01896945696018522c22fac007dc7e0a116553268e2e0b6ab0a13fda

  • SHA512

    595bae398fff092a995bd33f35833c0ec1a3f31faa7568a3d3564a7a003328cc7ee3ae7f7fee4c868a6beabbd04e8e6d8bbe71747a84c3260836dd28d952e4ef

  • SSDEEP

    768:v+qAUVByyyNylXUylqylylmMxgMyXAN5IkSFlOxXmZbLKIx07zQ:vNVrkl2oY

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\741\00f4be3e01896945696018522c22fac007dc7e0a116553268e2e0b6ab0a13fda.exe
    "C:\Users\Admin\AppData\Local\Temp\741\00f4be3e01896945696018522c22fac007dc7e0a116553268e2e0b6ab0a13fda.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:1948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    24KB

    MD5

    cbbd8f1451c57949ecb9673ebde99bea

    SHA1

    e69bf1ae5b9a80be036b741ee918cbbc3220e91a

    SHA256

    1d798b574d013a0cfac4a20fc44d497d3c3ac872e47c47bdaf602dc253bc60c8

    SHA512

    3c86ebff8fe09988a0b67d4141b8a8c42a3680680f82c68200b5887ef9ffe4b53bfb68c5bb5c1dec87d0ca4df94d7eb52148484ba989789c127acbaa3a4980cb

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    24KB

    MD5

    cbbd8f1451c57949ecb9673ebde99bea

    SHA1

    e69bf1ae5b9a80be036b741ee918cbbc3220e91a

    SHA256

    1d798b574d013a0cfac4a20fc44d497d3c3ac872e47c47bdaf602dc253bc60c8

    SHA512

    3c86ebff8fe09988a0b67d4141b8a8c42a3680680f82c68200b5887ef9ffe4b53bfb68c5bb5c1dec87d0ca4df94d7eb52148484ba989789c127acbaa3a4980cb

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    24KB

    MD5

    cbbd8f1451c57949ecb9673ebde99bea

    SHA1

    e69bf1ae5b9a80be036b741ee918cbbc3220e91a

    SHA256

    1d798b574d013a0cfac4a20fc44d497d3c3ac872e47c47bdaf602dc253bc60c8

    SHA512

    3c86ebff8fe09988a0b67d4141b8a8c42a3680680f82c68200b5887ef9ffe4b53bfb68c5bb5c1dec87d0ca4df94d7eb52148484ba989789c127acbaa3a4980cb

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    24KB

    MD5

    cbbd8f1451c57949ecb9673ebde99bea

    SHA1

    e69bf1ae5b9a80be036b741ee918cbbc3220e91a

    SHA256

    1d798b574d013a0cfac4a20fc44d497d3c3ac872e47c47bdaf602dc253bc60c8

    SHA512

    3c86ebff8fe09988a0b67d4141b8a8c42a3680680f82c68200b5887ef9ffe4b53bfb68c5bb5c1dec87d0ca4df94d7eb52148484ba989789c127acbaa3a4980cb

  • memory/1644-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB