Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-10-2023 01:32

General

  • Target

    NEAS.8f14e5948acacb1665e3291b2de45620.exe

  • Size

    62KB

  • MD5

    8f14e5948acacb1665e3291b2de45620

  • SHA1

    5dd5926c0ca3ccc21e071e5f829da829d631c240

  • SHA256

    bde880dcadc900b546f60abf21d6c6af61d1976fcdd7022cb6706fdebf58bddb

  • SHA512

    96d42c4a888353d05637fb0c216ebdafeee411fdfa7994ba446f840efd6c633ae9de94f4946c59e123d6e299d727e1edf63adaf0881266ec28d05637383b4dce

  • SSDEEP

    1536:5Y9jw/dUT62rGdiUOWWrMffJ+AxM+I+ceWgy:5Y9CUT62/UOVMffJ+AW+I+c/

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.8f14e5948acacb1665e3291b2de45620.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.8f14e5948acacb1665e3291b2de45620.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:4796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    62KB

    MD5

    301c7249407a68b0befb57219041cff1

    SHA1

    7cc4a779555aad87b9d058d6528d38e50427dba5

    SHA256

    3c8e27dc05531d37583b6965c686912963f75570af57c6c99abcb81d3a72e58d

    SHA512

    c15756264950207f781f4e66c6c129568ace688018fc302df15b8e7d9b00a34d1c560cb93d0a10104d885344ae75717955b28767a852d0a6afef78e18fe6257e

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    62KB

    MD5

    301c7249407a68b0befb57219041cff1

    SHA1

    7cc4a779555aad87b9d058d6528d38e50427dba5

    SHA256

    3c8e27dc05531d37583b6965c686912963f75570af57c6c99abcb81d3a72e58d

    SHA512

    c15756264950207f781f4e66c6c129568ace688018fc302df15b8e7d9b00a34d1c560cb93d0a10104d885344ae75717955b28767a852d0a6afef78e18fe6257e

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    62KB

    MD5

    301c7249407a68b0befb57219041cff1

    SHA1

    7cc4a779555aad87b9d058d6528d38e50427dba5

    SHA256

    3c8e27dc05531d37583b6965c686912963f75570af57c6c99abcb81d3a72e58d

    SHA512

    c15756264950207f781f4e66c6c129568ace688018fc302df15b8e7d9b00a34d1c560cb93d0a10104d885344ae75717955b28767a852d0a6afef78e18fe6257e

  • memory/2796-0-0x00000000006C0000-0x00000000006C1000-memory.dmp

    Filesize

    4KB

  • memory/2796-8-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4796-10-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB