Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 15:43

General

  • Target

    NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe

  • Size

    8KB

  • MD5

    022c0be05d759a1ba60f17caf49578a0

  • SHA1

    46ab0ab9b62cb7aa2507c21d53587696a9b7e117

  • SHA256

    ab2256740857bd670ee5ee6064073aa0343f2e0da4cc522f9d3d35f438ef0ab6

  • SHA512

    7d49031d6d08ceaa1f4f0aef867e90a0158370770fa8b7d6a124bbefed1f884cdcf93c52b04d6abddbe53b1a54dad69df7e3d5a2599cb5e3dbcffe2fd4777bbe

  • SSDEEP

    192:9mUWKs/L1nKfzShZ2ZEe9de/PKIbdWyYIQZK:6K+LJKfzQYhP4SIbdWyYIQZK

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    8KB

    MD5

    888ec21cc298d7f2a5c79cd2f1b57f43

    SHA1

    e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5

    SHA256

    4a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8

    SHA512

    d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    8KB

    MD5

    888ec21cc298d7f2a5c79cd2f1b57f43

    SHA1

    e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5

    SHA256

    4a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8

    SHA512

    d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    8KB

    MD5

    888ec21cc298d7f2a5c79cd2f1b57f43

    SHA1

    e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5

    SHA256

    4a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8

    SHA512

    d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    8KB

    MD5

    888ec21cc298d7f2a5c79cd2f1b57f43

    SHA1

    e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5

    SHA256

    4a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8

    SHA512

    d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    8KB

    MD5

    888ec21cc298d7f2a5c79cd2f1b57f43

    SHA1

    e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5

    SHA256

    4a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8

    SHA512

    d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69