Analysis Date2018-02-07 13:20:31
MD5380e35deb5a2ec396a8d716b52cdd66a
SHA1d7dfbfcf6281675104453dfc529a241732590c1c

Static Details:

File typePE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
PEhash
AVArcabit (arcavir)Trojan.Upatre.DG
AVAuthentiumW32/Trojan3.QML
AVGrisoft (avg)Error Scanning File
AVAvira (antivir)TR/Crypt.Xpack.154688
AVAlwil (avast)Upatre-N [Trj]
AVAd-AwareTrojan.Upatre.DG
AVBitDefenderTrojan.Upatre.DG
AVBullGuardTrojan.Upatre.DG
AVClamAVWin.Trojan.Upatre-5662
AVDr. WebTrojan.DownLoader15.42594
AVEmsisoftTrojan.Upatre.DG
AVMicroWorld (escan)Trojan.Upatre.DG
AVCA (E-Trust Ino)Trojan.Upatre.DG
AVFortinetW32/Waski.F!tr
AVFrisk (f-prot)W32/Trojan3.QML
AVF-SecureTrojan.Upatre.DG
AVIkarusTrojan-Downloader.Win32.Waski
AVK7Trojan ( 004c7f3d1 )
AVKasperskyTrojan.Win32.Generic
AVMalwareBytesTrojan.Upatre.Gen
AVMcafeeUpatre-FACE!380E35DEB5A2
AVMicrosoft Security EssentialsNo Virus
AVNANOTrojan.Win32.Crypted.dtekjc
AVEset (nod32)Win32/Kryptik.DNDR
AVPadvishNo Virus
AVCAT (quickheal)TrjnDwnlder.Upatre.MUE.BC3
AVRisingNo Virus
AV360 SafeNo Virus
AVSUPERAntiSpywareError Scanning File
AVSymantecDownloader.Upatre!gen9
AVTrend MicroTROJ_UPATRE.SMJU
AVTwisterTrojan.DOMG.hhhl
AVVirusBlokAda (vba32)No Virus
AVWindows DefenderTrojanDownloader:Win32/Upatre
AVZillya!Error Scanning File

Runtime Details:

Screenshot

Process
↳ C:\Windows\System32\lsass.exe

Process
↳ C:\Users\THX1138\AppData\Local\Temp\d7dfbfcf6281675104453dfc529a241732590c1c.exe

Creates FileC:\Windows\System32\catsrv.dll
Creates FileC:\Users\THX1138\AppData\Local\Temp\d7dfbfcf6281675104453dfc529a241732590c1c.exe
Creates FileC:\Users\THX1138\AppData\Local\Temp\d7dfbfcf6281675104453dfc529a241732590c1c.exe
Creates FileC:\Users\THX1138\AppData\Local\Temp\amourdid.exe
Creates Mutex
Creates Mutex

Process
↳ C:\Users\THX1138\AppData\Local\Temp\amourdid.exe

Creates FileC:\Windows\System32\catsrv.dll
Creates FileC:\Users\THX1138\AppData\Local\Temp\amourdid.exe
Creates FileC:\Users\THX1138\AppData\Local\Temp\amourdid.exe

Network Details:


Raw Pcap
0x00000000 (00000)   47455420 2f6e6373 692e7478 74204854   GET /ncsi.txt HT
0x00000010 (00016)   54502f31 2e310d0a 436f6e6e 65637469   TP/1.1..Connecti
0x00000020 (00032)   6f6e3a20 436c6f73 650d0a55 7365722d   on: Close..User-
0x00000030 (00048)   4167656e 743a204d 6963726f 736f6674   Agent: Microsoft
0x00000040 (00064)   204e4353 490d0a48 6f73743a 20777777    NCSI..Host: www
0x00000050 (00080)   2e6d7366 746e6373 692e636f 6d0d0a0d   .msftncsi.com...
0x00000060 (00096)   0a                                    .


Strings