Analysis
-
max time kernel
185s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:01
Behavioral task
behavioral1
Sample
c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe
Resource
win10v2004-20220812-en
General
-
Target
c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe
-
Size
506KB
-
MD5
5f0e85a1456e6b39b1962f0c4f581e54
-
SHA1
6c12a45775ba616d12b12ddc2c3e93f256dbdc67
-
SHA256
c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14
-
SHA512
42893e52de95ee2cdffa389f771703995ccdebd19c30a1441719804520157b5f79911ad2434895a9a3f853ee0363fc5c100ebc9dfb6ac031258557de48afca85
-
SSDEEP
12288:x6Wq4aaE6KwyF5L0Y2D1PqLBWr5JIRMA0KZ:HthEVaPqLBWYxHZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Uptools.exepid process 4564 Uptools.exe -
Processes:
resource yara_rule behavioral2/memory/4408-132-0x0000000000400000-0x0000000000504000-memory.dmp upx behavioral2/memory/4408-133-0x0000000000400000-0x0000000000504000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Uptools\Uptools.exe upx C:\Users\Admin\AppData\Roaming\Uptools\Uptools.exe upx behavioral2/memory/4408-137-0x0000000000400000-0x0000000000504000-memory.dmp upx behavioral2/memory/4564-138-0x0000000000400000-0x0000000000504000-memory.dmp upx -
Drops startup file 2 IoCs
Processes:
Uptools.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.lnk Uptools.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.lnk Uptools.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Uptools.exedescription ioc process File opened (read-only) \??\s: Uptools.exe File opened (read-only) \??\z: Uptools.exe File opened (read-only) \??\b: Uptools.exe File opened (read-only) \??\g: Uptools.exe File opened (read-only) \??\j: Uptools.exe File opened (read-only) \??\p: Uptools.exe File opened (read-only) \??\r: Uptools.exe File opened (read-only) \??\w: Uptools.exe File opened (read-only) \??\e: Uptools.exe File opened (read-only) \??\h: Uptools.exe File opened (read-only) \??\o: Uptools.exe File opened (read-only) \??\t: Uptools.exe File opened (read-only) \??\v: Uptools.exe File opened (read-only) \??\y: Uptools.exe File opened (read-only) \??\l: Uptools.exe File opened (read-only) \??\m: Uptools.exe File opened (read-only) \??\n: Uptools.exe File opened (read-only) \??\q: Uptools.exe File opened (read-only) \??\u: Uptools.exe File opened (read-only) \??\a: Uptools.exe File opened (read-only) \??\f: Uptools.exe File opened (read-only) \??\i: Uptools.exe File opened (read-only) \??\k: Uptools.exe File opened (read-only) \??\x: Uptools.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4408-133-0x0000000000400000-0x0000000000504000-memory.dmp autoit_exe behavioral2/memory/4408-137-0x0000000000400000-0x0000000000504000-memory.dmp autoit_exe behavioral2/memory/4564-138-0x0000000000400000-0x0000000000504000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exeUptools.exepid process 4408 c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe 4408 c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe 4408 c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe 4408 c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe 4564 Uptools.exe 4564 Uptools.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exedescription pid process target process PID 4408 wrote to memory of 4564 4408 c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe Uptools.exe PID 4408 wrote to memory of 4564 4408 c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe Uptools.exe PID 4408 wrote to memory of 4564 4408 c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe Uptools.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe"C:\Users\Admin\AppData\Local\Temp\c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Roaming\Uptools\Uptools.exeC:\Users\Admin\AppData\Roaming\Uptools\Uptools.exe2⤵
- Executes dropped EXE
- Drops startup file
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:4564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD55f0e85a1456e6b39b1962f0c4f581e54
SHA16c12a45775ba616d12b12ddc2c3e93f256dbdc67
SHA256c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14
SHA51242893e52de95ee2cdffa389f771703995ccdebd19c30a1441719804520157b5f79911ad2434895a9a3f853ee0363fc5c100ebc9dfb6ac031258557de48afca85
-
Filesize
506KB
MD55f0e85a1456e6b39b1962f0c4f581e54
SHA16c12a45775ba616d12b12ddc2c3e93f256dbdc67
SHA256c714300122bf77b44782e2185e461a45068bfd36be117810981ec8814adf8e14
SHA51242893e52de95ee2cdffa389f771703995ccdebd19c30a1441719804520157b5f79911ad2434895a9a3f853ee0363fc5c100ebc9dfb6ac031258557de48afca85