Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 15:43
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe
-
Size
8KB
-
MD5
022c0be05d759a1ba60f17caf49578a0
-
SHA1
46ab0ab9b62cb7aa2507c21d53587696a9b7e117
-
SHA256
ab2256740857bd670ee5ee6064073aa0343f2e0da4cc522f9d3d35f438ef0ab6
-
SHA512
7d49031d6d08ceaa1f4f0aef867e90a0158370770fa8b7d6a124bbefed1f884cdcf93c52b04d6abddbe53b1a54dad69df7e3d5a2599cb5e3dbcffe2fd4777bbe
-
SSDEEP
192:9mUWKs/L1nKfzShZ2ZEe9de/PKIbdWyYIQZK:6K+LJKfzQYhP4SIbdWyYIQZK
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2284 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2708 NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe 2708 NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2284 2708 NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe 28 PID 2708 wrote to memory of 2284 2708 NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe 28 PID 2708 wrote to memory of 2284 2708 NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe 28 PID 2708 wrote to memory of 2284 2708 NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.022c0be05d759a1ba60f17caf49578a0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5888ec21cc298d7f2a5c79cd2f1b57f43
SHA1e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5
SHA2564a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8
SHA512d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69
-
Filesize
8KB
MD5888ec21cc298d7f2a5c79cd2f1b57f43
SHA1e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5
SHA2564a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8
SHA512d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69
-
Filesize
8KB
MD5888ec21cc298d7f2a5c79cd2f1b57f43
SHA1e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5
SHA2564a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8
SHA512d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69
-
Filesize
8KB
MD5888ec21cc298d7f2a5c79cd2f1b57f43
SHA1e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5
SHA2564a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8
SHA512d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69
-
Filesize
8KB
MD5888ec21cc298d7f2a5c79cd2f1b57f43
SHA1e0d138211d2b2d6ae7f83b5f35c562fe0bc431e5
SHA2564a9a6efdd0f7ef570658ed4674e92a919feb135eb770ff9f6fe55a232465c7e8
SHA512d3a81c2a95f5168001675937e8ab98df6e000271bf36243ba7c9f8342eaf65ebc9b2bd486c84be7b6131fda537eb421863655f5aa9994a81af3ec574e4cebb69