Analysis

  • max time kernel
    168s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2023 13:27

General

  • Target

    NEAS.603a8f664af08aac0e419f2e35a16869_JC.exe

  • Size

    34KB

  • MD5

    603a8f664af08aac0e419f2e35a16869

  • SHA1

    dacaab6108877b1766d244401cc7305bd88bc298

  • SHA256

    17836982805782864a82a83ffec59ca02462b608679364257a77fab56d4a6578

  • SHA512

    d9189fa8b1a7e8f1a3f1841757fc20b7b63b0e93f94095e068fa6c10df072bbc05c02463fccb4bedfd966a58ac002472fa5a21fb538c4dd5e6501f5fad584266

  • SSDEEP

    768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rPy8FX5A:GY9jw/dUT62rGdiUOWWra8F6

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.603a8f664af08aac0e419f2e35a16869_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.603a8f664af08aac0e419f2e35a16869_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:4356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    34KB

    MD5

    f7733c5589242d48fef772fd7531ad32

    SHA1

    452ed0e4aa208b2d02dbc31ed593a4b57181f281

    SHA256

    79067d629132a5bb8ba2f135b8fc0b11d2b3c75fd455ba4f00a63fc011dbe687

    SHA512

    dd619379a14d20d49dffd3999fec8908d64e451259e5d2d038f7ab67042c1cf46470e4cb550de12938165202866473a003d03a483af8f6211ac07eebb38c9b55

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    34KB

    MD5

    f7733c5589242d48fef772fd7531ad32

    SHA1

    452ed0e4aa208b2d02dbc31ed593a4b57181f281

    SHA256

    79067d629132a5bb8ba2f135b8fc0b11d2b3c75fd455ba4f00a63fc011dbe687

    SHA512

    dd619379a14d20d49dffd3999fec8908d64e451259e5d2d038f7ab67042c1cf46470e4cb550de12938165202866473a003d03a483af8f6211ac07eebb38c9b55

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    34KB

    MD5

    f7733c5589242d48fef772fd7531ad32

    SHA1

    452ed0e4aa208b2d02dbc31ed593a4b57181f281

    SHA256

    79067d629132a5bb8ba2f135b8fc0b11d2b3c75fd455ba4f00a63fc011dbe687

    SHA512

    dd619379a14d20d49dffd3999fec8908d64e451259e5d2d038f7ab67042c1cf46470e4cb550de12938165202866473a003d03a483af8f6211ac07eebb38c9b55

  • memory/3464-0-0x00000000005B0000-0x00000000005B1000-memory.dmp

    Filesize

    4KB

  • memory/3464-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4356-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB