Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2023 01:32
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8f14e5948acacb1665e3291b2de45620.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8f14e5948acacb1665e3291b2de45620.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.8f14e5948acacb1665e3291b2de45620.exe
-
Size
62KB
-
MD5
8f14e5948acacb1665e3291b2de45620
-
SHA1
5dd5926c0ca3ccc21e071e5f829da829d631c240
-
SHA256
bde880dcadc900b546f60abf21d6c6af61d1976fcdd7022cb6706fdebf58bddb
-
SHA512
96d42c4a888353d05637fb0c216ebdafeee411fdfa7994ba446f840efd6c633ae9de94f4946c59e123d6e299d727e1edf63adaf0881266ec28d05637383b4dce
-
SSDEEP
1536:5Y9jw/dUT62rGdiUOWWrMffJ+AxM+I+ceWgy:5Y9CUT62/UOVMffJ+AW+I+c/
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation NEAS.8f14e5948acacb1665e3291b2de45620.exe -
Executes dropped EXE 1 IoCs
pid Process 4796 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4796 2796 NEAS.8f14e5948acacb1665e3291b2de45620.exe 89 PID 2796 wrote to memory of 4796 2796 NEAS.8f14e5948acacb1665e3291b2de45620.exe 89 PID 2796 wrote to memory of 4796 2796 NEAS.8f14e5948acacb1665e3291b2de45620.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8f14e5948acacb1665e3291b2de45620.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8f14e5948acacb1665e3291b2de45620.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5301c7249407a68b0befb57219041cff1
SHA17cc4a779555aad87b9d058d6528d38e50427dba5
SHA2563c8e27dc05531d37583b6965c686912963f75570af57c6c99abcb81d3a72e58d
SHA512c15756264950207f781f4e66c6c129568ace688018fc302df15b8e7d9b00a34d1c560cb93d0a10104d885344ae75717955b28767a852d0a6afef78e18fe6257e
-
Filesize
62KB
MD5301c7249407a68b0befb57219041cff1
SHA17cc4a779555aad87b9d058d6528d38e50427dba5
SHA2563c8e27dc05531d37583b6965c686912963f75570af57c6c99abcb81d3a72e58d
SHA512c15756264950207f781f4e66c6c129568ace688018fc302df15b8e7d9b00a34d1c560cb93d0a10104d885344ae75717955b28767a852d0a6afef78e18fe6257e
-
Filesize
62KB
MD5301c7249407a68b0befb57219041cff1
SHA17cc4a779555aad87b9d058d6528d38e50427dba5
SHA2563c8e27dc05531d37583b6965c686912963f75570af57c6c99abcb81d3a72e58d
SHA512c15756264950207f781f4e66c6c129568ace688018fc302df15b8e7d9b00a34d1c560cb93d0a10104d885344ae75717955b28767a852d0a6afef78e18fe6257e