Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 16:23
Static task
static1
Behavioral task
behavioral1
Sample
easyMalicious10a2bf2f5e49.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easyMalicious10a2bf2f5e49.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious10a2bf2f5e49.exe
-
Size
32KB
-
MD5
76f4fd15208435592af8b71b100092ee
-
SHA1
7c7cd8092f90c9893f4ce670c6556a091dbbccb0
-
SHA256
582276b350bb8b058d540c6c234ceff1b200952ae568f893afd97f10409116a9
-
SHA512
3c8bdfcb276b05a20cc602b7221123fd7721761b35ebaa02d66b02454028ca32448422312736a8303b45eb584a8d313b923cb381fc401b16e0f164cd492a38e0
-
SSDEEP
384:ovbf1Y9qpeROAq/VfUT6vupj3InXd/bS2kUOW5GAMECxk8h9XK+Es:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rh9/
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2180 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2360 easyMalicious10a2bf2f5e49.exe 2360 easyMalicious10a2bf2f5e49.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2180 2360 easyMalicious10a2bf2f5e49.exe 29 PID 2360 wrote to memory of 2180 2360 easyMalicious10a2bf2f5e49.exe 29 PID 2360 wrote to memory of 2180 2360 easyMalicious10a2bf2f5e49.exe 29 PID 2360 wrote to memory of 2180 2360 easyMalicious10a2bf2f5e49.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\easyMalicious10a2bf2f5e49.exe"C:\Users\Admin\AppData\Local\Temp\easyMalicious10a2bf2f5e49.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2180
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5635935a926dae764ae0433de00b5ffd0
SHA1070608172bfbb3c910ac7eb131089268bce82bff
SHA25621e5f7c2037d8f7b12b0f9059493f17fe1cfcffaeada551b877ca01e395a1e40
SHA5129e92671c6c943c648bc5beacff50185a2a70a05fca80356cab3a8b0d2903a7d00afe380434d0d5b8e32f03f2ed669f2d41d4549595ff95dd168f3fa4ca44ea4b
-
Filesize
32KB
MD5635935a926dae764ae0433de00b5ffd0
SHA1070608172bfbb3c910ac7eb131089268bce82bff
SHA25621e5f7c2037d8f7b12b0f9059493f17fe1cfcffaeada551b877ca01e395a1e40
SHA5129e92671c6c943c648bc5beacff50185a2a70a05fca80356cab3a8b0d2903a7d00afe380434d0d5b8e32f03f2ed669f2d41d4549595ff95dd168f3fa4ca44ea4b
-
Filesize
32KB
MD5635935a926dae764ae0433de00b5ffd0
SHA1070608172bfbb3c910ac7eb131089268bce82bff
SHA25621e5f7c2037d8f7b12b0f9059493f17fe1cfcffaeada551b877ca01e395a1e40
SHA5129e92671c6c943c648bc5beacff50185a2a70a05fca80356cab3a8b0d2903a7d00afe380434d0d5b8e32f03f2ed669f2d41d4549595ff95dd168f3fa4ca44ea4b
-
Filesize
32KB
MD5635935a926dae764ae0433de00b5ffd0
SHA1070608172bfbb3c910ac7eb131089268bce82bff
SHA25621e5f7c2037d8f7b12b0f9059493f17fe1cfcffaeada551b877ca01e395a1e40
SHA5129e92671c6c943c648bc5beacff50185a2a70a05fca80356cab3a8b0d2903a7d00afe380434d0d5b8e32f03f2ed669f2d41d4549595ff95dd168f3fa4ca44ea4b
-
Filesize
32KB
MD5635935a926dae764ae0433de00b5ffd0
SHA1070608172bfbb3c910ac7eb131089268bce82bff
SHA25621e5f7c2037d8f7b12b0f9059493f17fe1cfcffaeada551b877ca01e395a1e40
SHA5129e92671c6c943c648bc5beacff50185a2a70a05fca80356cab3a8b0d2903a7d00afe380434d0d5b8e32f03f2ed669f2d41d4549595ff95dd168f3fa4ca44ea4b