Analysis

  • max time kernel
    137s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2023 21:35

General

  • Target

    NEAS.e3dd452c48829c69798edd71c038f1c0.exe

  • Size

    4KB

  • MD5

    e3dd452c48829c69798edd71c038f1c0

  • SHA1

    3cd7ac0f6eaeb6aea9398cc2a29ed0a0436a68a9

  • SHA256

    670e32aaff71250c27b0b3a184e503a5bdf6e8bce6bbbb2e460941d7eba70769

  • SHA512

    9e9e58e953a8b49f603b0f90563354bb540698e09eb691f8a2dbfec7b09d645100e7f76342782f00a703ea610321829be51bb7e163b0168ebe01ef25909072c5

  • SSDEEP

    48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RsX9TnA7B8mOo4jUx7OtKGc:Z0v4mUWKh9ctgC1RoFnKymV44Sh

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e3dd452c48829c69798edd71c038f1c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e3dd452c48829c69798edd71c038f1c0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    4KB

    MD5

    6e00294c972de42e494a91f5f78deba8

    SHA1

    58c690f4d7c5d25e0b7f4f31e51eef1a13e3b3ce

    SHA256

    2f02e73907d54892fc10af7fb33a16f620038f3a62ea95adff5f5a386ba3c786

    SHA512

    884986357206a815ad9e6e9d2de00fea94bfb150cb5140951b8bbb75c2147d6f01f2724db7b23629643a862e0b30c4c2412fdc91124bfe5f77c31fe02e822724

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    4KB

    MD5

    6e00294c972de42e494a91f5f78deba8

    SHA1

    58c690f4d7c5d25e0b7f4f31e51eef1a13e3b3ce

    SHA256

    2f02e73907d54892fc10af7fb33a16f620038f3a62ea95adff5f5a386ba3c786

    SHA512

    884986357206a815ad9e6e9d2de00fea94bfb150cb5140951b8bbb75c2147d6f01f2724db7b23629643a862e0b30c4c2412fdc91124bfe5f77c31fe02e822724

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    4KB

    MD5

    6e00294c972de42e494a91f5f78deba8

    SHA1

    58c690f4d7c5d25e0b7f4f31e51eef1a13e3b3ce

    SHA256

    2f02e73907d54892fc10af7fb33a16f620038f3a62ea95adff5f5a386ba3c786

    SHA512

    884986357206a815ad9e6e9d2de00fea94bfb150cb5140951b8bbb75c2147d6f01f2724db7b23629643a862e0b30c4c2412fdc91124bfe5f77c31fe02e822724