Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 07:47
Static task
static1
Behavioral task
behavioral1
Sample
3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe
Resource
win10v2004-20230220-en
General
-
Target
3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe
-
Size
4KB
-
MD5
dfbb4521b0b51a88e7fcc59e6b140ef6
-
SHA1
b1e65c96e931c5bc6a1eff0e23d31ef8d99c72c9
-
SHA256
3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6
-
SHA512
5d4e53d809b01ab515b7f7af69573d5da7b9e4df2898e5bc2636b408d7b52d4f71a5237756926b5a58a7029d58a9892a776228302320f7a9964583004590550c
-
SSDEEP
48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RssNnA7B8mOo4jUx7OtKGc:Z0v4mUWKh9ctgC1RnNnKymV44Sh
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Deletes itself 1 IoCs
pid Process 1724 szgfw.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1376 3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe 1376 3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1724 1376 3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe 28 PID 1376 wrote to memory of 1724 1376 3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe 28 PID 1376 wrote to memory of 1724 1376 3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe 28 PID 1376 wrote to memory of 1724 1376 3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe"C:\Users\Admin\AppData\Local\Temp\3e0ff50184e04798a2a0c55dd39f482ebfd821668fc00e896c05b2692030dbd6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54023d2ba233677ee5735328474e645f4
SHA16c52eeac4d1db576b194bffe0a0085b789f398f1
SHA2569b8b350215b3f3f443baaff2302b8c3ac9d74891d5580d27c524bac4e9c156bb
SHA51226315c8090e78e157d3df7f0c8c9eefede7ed41a50d12c8faa0eeac63fe3761285f1b5a5555ab0bfa45f563469f5e152e9b1847dda50a95da9cb9adfa7299c1f
-
Filesize
4KB
MD54023d2ba233677ee5735328474e645f4
SHA16c52eeac4d1db576b194bffe0a0085b789f398f1
SHA2569b8b350215b3f3f443baaff2302b8c3ac9d74891d5580d27c524bac4e9c156bb
SHA51226315c8090e78e157d3df7f0c8c9eefede7ed41a50d12c8faa0eeac63fe3761285f1b5a5555ab0bfa45f563469f5e152e9b1847dda50a95da9cb9adfa7299c1f
-
Filesize
4KB
MD54023d2ba233677ee5735328474e645f4
SHA16c52eeac4d1db576b194bffe0a0085b789f398f1
SHA2569b8b350215b3f3f443baaff2302b8c3ac9d74891d5580d27c524bac4e9c156bb
SHA51226315c8090e78e157d3df7f0c8c9eefede7ed41a50d12c8faa0eeac63fe3761285f1b5a5555ab0bfa45f563469f5e152e9b1847dda50a95da9cb9adfa7299c1f
-
Filesize
4KB
MD54023d2ba233677ee5735328474e645f4
SHA16c52eeac4d1db576b194bffe0a0085b789f398f1
SHA2569b8b350215b3f3f443baaff2302b8c3ac9d74891d5580d27c524bac4e9c156bb
SHA51226315c8090e78e157d3df7f0c8c9eefede7ed41a50d12c8faa0eeac63fe3761285f1b5a5555ab0bfa45f563469f5e152e9b1847dda50a95da9cb9adfa7299c1f
-
Filesize
4KB
MD54023d2ba233677ee5735328474e645f4
SHA16c52eeac4d1db576b194bffe0a0085b789f398f1
SHA2569b8b350215b3f3f443baaff2302b8c3ac9d74891d5580d27c524bac4e9c156bb
SHA51226315c8090e78e157d3df7f0c8c9eefede7ed41a50d12c8faa0eeac63fe3761285f1b5a5555ab0bfa45f563469f5e152e9b1847dda50a95da9cb9adfa7299c1f