Analysis
-
max time kernel
156s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2023 02:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d7722a3ed4259676965c019336b39200.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d7722a3ed4259676965c019336b39200.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d7722a3ed4259676965c019336b39200.exe
-
Size
130KB
-
MD5
d7722a3ed4259676965c019336b39200
-
SHA1
0370f5f0d021a68ccee5f0b476c5d66f854b42cb
-
SHA256
93300569f5b46f488acceb65fbc0b2c7528c4ac429c609ed8ed172fd195a5a72
-
SHA512
a46918d41ad5ea3f70cca5043338afdac8366af8ec69f928d343cce7357a4222d0825b0a4fdc4a3ac45d85dd6e4a2d57ccc1a80cc11efd6f3704d249d73e2b72
-
SSDEEP
3072:tY9CUT62/UOVMgJsgJMgJogJwgJ0zqgJ01J3RgJ01JygJ01JK8gJ01JK2gJ01JKs:tY9C8QyFJlJFJRJZJqJyJ3CJyJbJyJW8
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.d7722a3ed4259676965c019336b39200.exe -
Executes dropped EXE 1 IoCs
pid Process 3444 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3444 2772 NEAS.d7722a3ed4259676965c019336b39200.exe 90 PID 2772 wrote to memory of 3444 2772 NEAS.d7722a3ed4259676965c019336b39200.exe 90 PID 2772 wrote to memory of 3444 2772 NEAS.d7722a3ed4259676965c019336b39200.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d7722a3ed4259676965c019336b39200.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d7722a3ed4259676965c019336b39200.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:3444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5ff59f07fd260c8893fcab4c643c839b1
SHA179bff8b947b78e62436bbee063c326b1a66a994d
SHA256ccd6ecc4e59ca04a3db9be1fa97ff3f666961c5b5f0552805a412325d85817bc
SHA512fbe791000373205fdaf83d75b0a94bb73e77f0f296d2cb08d98bfe72365740fbd52e4476d80e0c4a764f20d97a09409e74436c7d23df24a46597c12ec7e0c490
-
Filesize
130KB
MD5ff59f07fd260c8893fcab4c643c839b1
SHA179bff8b947b78e62436bbee063c326b1a66a994d
SHA256ccd6ecc4e59ca04a3db9be1fa97ff3f666961c5b5f0552805a412325d85817bc
SHA512fbe791000373205fdaf83d75b0a94bb73e77f0f296d2cb08d98bfe72365740fbd52e4476d80e0c4a764f20d97a09409e74436c7d23df24a46597c12ec7e0c490
-
Filesize
130KB
MD5ff59f07fd260c8893fcab4c643c839b1
SHA179bff8b947b78e62436bbee063c326b1a66a994d
SHA256ccd6ecc4e59ca04a3db9be1fa97ff3f666961c5b5f0552805a412325d85817bc
SHA512fbe791000373205fdaf83d75b0a94bb73e77f0f296d2cb08d98bfe72365740fbd52e4476d80e0c4a764f20d97a09409e74436c7d23df24a46597c12ec7e0c490