Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 15:28
Static task
static1
Behavioral task
behavioral1
Sample
easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe
Resource
win10v2004-20230621-en
General
-
Target
easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe
-
Size
32KB
-
MD5
76f4fd15208435592af8b71b100092ee
-
SHA1
7c7cd8092f90c9893f4ce670c6556a091dbbccb0
-
SHA256
582276b350bb8b058d540c6c234ceff1b200952ae568f893afd97f10409116a9
-
SHA512
3c8bdfcb276b05a20cc602b7221123fd7721761b35ebaa02d66b02454028ca32448422312736a8303b45eb584a8d313b923cb381fc401b16e0f164cd492a38e0
-
SSDEEP
384:ovbf1Y9qpeROAq/VfUT6vupj3InXd/bS2kUOW5GAMECxk8h9XK+Es:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rh9/
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2848 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2396 easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe 2396 easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2848 2396 easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe 28 PID 2396 wrote to memory of 2848 2396 easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe 28 PID 2396 wrote to memory of 2848 2396 easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe 28 PID 2396 wrote to memory of 2848 2396 easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe"C:\Users\Admin\AppData\Local\Temp\easy_Malicious_10a2bf2f5e49600d55e72ebcc409cd801511c1d9d8a5cc340ffe1e2beedcd544.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD53aa4310d9f88d07184b426f5b68e0f41
SHA1bf810a366843b9e21839e6be6f98a49b68343a6e
SHA25678095559dbe3b764d4a2197167752bfa7ea1ff3ad4ce1e140768be794be68df4
SHA51286e087c8dca5d617ace2fe4d4b2d58d97b1e6030632e78a157ad5fdae61417f574c591a3c7348281beb0eb18d0e9184c5c4e38cdbe78e4fb6ba462e2267c1f05
-
Filesize
32KB
MD53aa4310d9f88d07184b426f5b68e0f41
SHA1bf810a366843b9e21839e6be6f98a49b68343a6e
SHA25678095559dbe3b764d4a2197167752bfa7ea1ff3ad4ce1e140768be794be68df4
SHA51286e087c8dca5d617ace2fe4d4b2d58d97b1e6030632e78a157ad5fdae61417f574c591a3c7348281beb0eb18d0e9184c5c4e38cdbe78e4fb6ba462e2267c1f05
-
Filesize
32KB
MD53aa4310d9f88d07184b426f5b68e0f41
SHA1bf810a366843b9e21839e6be6f98a49b68343a6e
SHA25678095559dbe3b764d4a2197167752bfa7ea1ff3ad4ce1e140768be794be68df4
SHA51286e087c8dca5d617ace2fe4d4b2d58d97b1e6030632e78a157ad5fdae61417f574c591a3c7348281beb0eb18d0e9184c5c4e38cdbe78e4fb6ba462e2267c1f05
-
Filesize
32KB
MD53aa4310d9f88d07184b426f5b68e0f41
SHA1bf810a366843b9e21839e6be6f98a49b68343a6e
SHA25678095559dbe3b764d4a2197167752bfa7ea1ff3ad4ce1e140768be794be68df4
SHA51286e087c8dca5d617ace2fe4d4b2d58d97b1e6030632e78a157ad5fdae61417f574c591a3c7348281beb0eb18d0e9184c5c4e38cdbe78e4fb6ba462e2267c1f05
-
Filesize
32KB
MD53aa4310d9f88d07184b426f5b68e0f41
SHA1bf810a366843b9e21839e6be6f98a49b68343a6e
SHA25678095559dbe3b764d4a2197167752bfa7ea1ff3ad4ce1e140768be794be68df4
SHA51286e087c8dca5d617ace2fe4d4b2d58d97b1e6030632e78a157ad5fdae61417f574c591a3c7348281beb0eb18d0e9184c5c4e38cdbe78e4fb6ba462e2267c1f05