Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 07:46
Static task
static1
Behavioral task
behavioral1
Sample
ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe
Resource
win10v2004-20230220-en
General
-
Target
ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe
-
Size
4KB
-
MD5
64f5816cc636e4f27170fc7dc78c38c5
-
SHA1
757f088fbaef5695198bef0711b915e2b601c22c
-
SHA256
ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3
-
SHA512
f7ce5e8a7ae06e2747ace177cdb685452f2a5a1d3d4c7b29dbb76db16512347e0d029dfb1fe07ef7f23a29494dbc0cf1088f9c3cc6bcaa7e95e1f3b38bc40370
-
SSDEEP
48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RspLnA7B8mOo4jUx7OtKGc:Z0v4mUWKh9ctgC1RcLnKymV44Sh
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Deletes itself 1 IoCs
pid Process 1468 szgfw.exe -
Executes dropped EXE 1 IoCs
pid Process 1468 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1556 ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe 1556 ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1556 wrote to memory of 1468 1556 ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe 28 PID 1556 wrote to memory of 1468 1556 ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe 28 PID 1556 wrote to memory of 1468 1556 ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe 28 PID 1556 wrote to memory of 1468 1556 ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe"C:\Users\Admin\AppData\Local\Temp\ba936fcd3da7526247cb4f156ff7a4075e4ca4dffdf5f45a4dc0f47bd6dc37f3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f898224ed2e522f9897960e03c715f85
SHA1200e44124300004ad0638537994902601590ef71
SHA2565a803914b814dbe2a7ad1f16d331b8d0c495a5330643f218a555801d63059ab5
SHA512c1fc721f1957b1d65dbaf560be5e6ae5bc29b42b1b799572f0f9933cf022b254df008a7d97148bee07e5db4e295992a72b1e9880c00495b30967f42029b7fe8c
-
Filesize
4KB
MD5f898224ed2e522f9897960e03c715f85
SHA1200e44124300004ad0638537994902601590ef71
SHA2565a803914b814dbe2a7ad1f16d331b8d0c495a5330643f218a555801d63059ab5
SHA512c1fc721f1957b1d65dbaf560be5e6ae5bc29b42b1b799572f0f9933cf022b254df008a7d97148bee07e5db4e295992a72b1e9880c00495b30967f42029b7fe8c
-
Filesize
4KB
MD5f898224ed2e522f9897960e03c715f85
SHA1200e44124300004ad0638537994902601590ef71
SHA2565a803914b814dbe2a7ad1f16d331b8d0c495a5330643f218a555801d63059ab5
SHA512c1fc721f1957b1d65dbaf560be5e6ae5bc29b42b1b799572f0f9933cf022b254df008a7d97148bee07e5db4e295992a72b1e9880c00495b30967f42029b7fe8c
-
Filesize
4KB
MD5f898224ed2e522f9897960e03c715f85
SHA1200e44124300004ad0638537994902601590ef71
SHA2565a803914b814dbe2a7ad1f16d331b8d0c495a5330643f218a555801d63059ab5
SHA512c1fc721f1957b1d65dbaf560be5e6ae5bc29b42b1b799572f0f9933cf022b254df008a7d97148bee07e5db4e295992a72b1e9880c00495b30967f42029b7fe8c
-
Filesize
4KB
MD5f898224ed2e522f9897960e03c715f85
SHA1200e44124300004ad0638537994902601590ef71
SHA2565a803914b814dbe2a7ad1f16d331b8d0c495a5330643f218a555801d63059ab5
SHA512c1fc721f1957b1d65dbaf560be5e6ae5bc29b42b1b799572f0f9933cf022b254df008a7d97148bee07e5db4e295992a72b1e9880c00495b30967f42029b7fe8c