Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
winupas.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
winupas.exe
Resource
win10v2004-20230703-en
General
-
Target
winupas.exe
-
Size
177KB
-
MD5
6dab0adacbf99a4870eea3ba5e50203c
-
SHA1
b674453f925202773462ce00499fdb6a9cfe9484
-
SHA256
e70dc307eaf88429650359397c74ae88663df1cfc05b8e97f80d0bad758986ee
-
SHA512
cc96a17601b74869b34c08eef7a36376b7889b94f89ae0de4b3c1f07828f9d126250bd2b6c66b1a925faf77d27ba7f0c8001488bfab8d400709e6d820e35c012
-
SSDEEP
3072:nqn8swZo+N1kF56rwOixLuY3I4NkxDVXflF2FIPy:qn8swZo+7183LuVXflF2F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1572 winupas.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 winupas.exe 2040 winupas.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update Assistant = "\"C:\\Users\\Admin\\AppData\\Roaming\\winupas.exe\" x" winupas.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1572 2040 winupas.exe 28 PID 2040 wrote to memory of 1572 2040 winupas.exe 28 PID 2040 wrote to memory of 1572 2040 winupas.exe 28 PID 2040 wrote to memory of 1572 2040 winupas.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\winupas.exe"C:\Users\Admin\AppData\Local\Temp\winupas.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\winupas.exe"C:\Users\Admin\AppData\Roaming\winupas.exe" x2⤵
- Executes dropped EXE
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD56dab0adacbf99a4870eea3ba5e50203c
SHA1b674453f925202773462ce00499fdb6a9cfe9484
SHA256e70dc307eaf88429650359397c74ae88663df1cfc05b8e97f80d0bad758986ee
SHA512cc96a17601b74869b34c08eef7a36376b7889b94f89ae0de4b3c1f07828f9d126250bd2b6c66b1a925faf77d27ba7f0c8001488bfab8d400709e6d820e35c012
-
Filesize
177KB
MD56dab0adacbf99a4870eea3ba5e50203c
SHA1b674453f925202773462ce00499fdb6a9cfe9484
SHA256e70dc307eaf88429650359397c74ae88663df1cfc05b8e97f80d0bad758986ee
SHA512cc96a17601b74869b34c08eef7a36376b7889b94f89ae0de4b3c1f07828f9d126250bd2b6c66b1a925faf77d27ba7f0c8001488bfab8d400709e6d820e35c012
-
Filesize
177KB
MD56dab0adacbf99a4870eea3ba5e50203c
SHA1b674453f925202773462ce00499fdb6a9cfe9484
SHA256e70dc307eaf88429650359397c74ae88663df1cfc05b8e97f80d0bad758986ee
SHA512cc96a17601b74869b34c08eef7a36376b7889b94f89ae0de4b3c1f07828f9d126250bd2b6c66b1a925faf77d27ba7f0c8001488bfab8d400709e6d820e35c012
-
Filesize
177KB
MD56dab0adacbf99a4870eea3ba5e50203c
SHA1b674453f925202773462ce00499fdb6a9cfe9484
SHA256e70dc307eaf88429650359397c74ae88663df1cfc05b8e97f80d0bad758986ee
SHA512cc96a17601b74869b34c08eef7a36376b7889b94f89ae0de4b3c1f07828f9d126250bd2b6c66b1a925faf77d27ba7f0c8001488bfab8d400709e6d820e35c012
-
Filesize
177KB
MD56dab0adacbf99a4870eea3ba5e50203c
SHA1b674453f925202773462ce00499fdb6a9cfe9484
SHA256e70dc307eaf88429650359397c74ae88663df1cfc05b8e97f80d0bad758986ee
SHA512cc96a17601b74869b34c08eef7a36376b7889b94f89ae0de4b3c1f07828f9d126250bd2b6c66b1a925faf77d27ba7f0c8001488bfab8d400709e6d820e35c012