Analysis
-
max time kernel
137s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2023 21:35
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e3dd452c48829c69798edd71c038f1c0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.e3dd452c48829c69798edd71c038f1c0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e3dd452c48829c69798edd71c038f1c0.exe
-
Size
4KB
-
MD5
e3dd452c48829c69798edd71c038f1c0
-
SHA1
3cd7ac0f6eaeb6aea9398cc2a29ed0a0436a68a9
-
SHA256
670e32aaff71250c27b0b3a184e503a5bdf6e8bce6bbbb2e460941d7eba70769
-
SHA512
9e9e58e953a8b49f603b0f90563354bb540698e09eb691f8a2dbfec7b09d645100e7f76342782f00a703ea610321829be51bb7e163b0168ebe01ef25909072c5
-
SSDEEP
48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RsX9TnA7B8mOo4jUx7OtKGc:Z0v4mUWKh9ctgC1RoFnKymV44Sh
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\International\Geo\Nation NEAS.e3dd452c48829c69798edd71c038f1c0.exe -
Deletes itself 1 IoCs
pid Process 2844 szgfw.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2844 1944 NEAS.e3dd452c48829c69798edd71c038f1c0.exe 86 PID 1944 wrote to memory of 2844 1944 NEAS.e3dd452c48829c69798edd71c038f1c0.exe 86 PID 1944 wrote to memory of 2844 1944 NEAS.e3dd452c48829c69798edd71c038f1c0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e3dd452c48829c69798edd71c038f1c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e3dd452c48829c69798edd71c038f1c0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD56e00294c972de42e494a91f5f78deba8
SHA158c690f4d7c5d25e0b7f4f31e51eef1a13e3b3ce
SHA2562f02e73907d54892fc10af7fb33a16f620038f3a62ea95adff5f5a386ba3c786
SHA512884986357206a815ad9e6e9d2de00fea94bfb150cb5140951b8bbb75c2147d6f01f2724db7b23629643a862e0b30c4c2412fdc91124bfe5f77c31fe02e822724
-
Filesize
4KB
MD56e00294c972de42e494a91f5f78deba8
SHA158c690f4d7c5d25e0b7f4f31e51eef1a13e3b3ce
SHA2562f02e73907d54892fc10af7fb33a16f620038f3a62ea95adff5f5a386ba3c786
SHA512884986357206a815ad9e6e9d2de00fea94bfb150cb5140951b8bbb75c2147d6f01f2724db7b23629643a862e0b30c4c2412fdc91124bfe5f77c31fe02e822724
-
Filesize
4KB
MD56e00294c972de42e494a91f5f78deba8
SHA158c690f4d7c5d25e0b7f4f31e51eef1a13e3b3ce
SHA2562f02e73907d54892fc10af7fb33a16f620038f3a62ea95adff5f5a386ba3c786
SHA512884986357206a815ad9e6e9d2de00fea94bfb150cb5140951b8bbb75c2147d6f01f2724db7b23629643a862e0b30c4c2412fdc91124bfe5f77c31fe02e822724