Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2023 01:07

General

  • Target

    NEAS.de3c5b1cd6b908da9744e395a78873c0_JC.exe

  • Size

    63KB

  • MD5

    de3c5b1cd6b908da9744e395a78873c0

  • SHA1

    86d58d8f3a38202725e38a711d50185917fd37b9

  • SHA256

    ac72b5dd322903d990753cc4d936a809cf7c0d9ab0bbd351d4d9edb7335fb756

  • SHA512

    3eafd8d136b420afbbd86ca993a85da0297556e3e4854693c4a8763fd9e2de1765fdaaa4ad379e6b4f2ba4316a633472f3e32df0f29b9e24351921823d9df3a5

  • SSDEEP

    1536:5Y9jw/dUT62rGdiUOWWrMffJ+AxM+I+ceWgqLK:5Y9CUT62/UOVMffJ+AW+I+c0

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.de3c5b1cd6b908da9744e395a78873c0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.de3c5b1cd6b908da9744e395a78873c0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    63KB

    MD5

    8bd26e2c20f1583ff5f0cc7c8bb716c3

    SHA1

    ed16d9d0b36d9b84fdcfa990e1204666e2f807d8

    SHA256

    4a62549ae562b1d0adea1089abf1cfead7e4aa9cbb79a4dded7f83f477ef0fa9

    SHA512

    410b9d934c548e35a0e3461ac226b892e75fd6b3f1683df05d49d526850ec31336d63667eaa1a2e6e2099066d73eedde4538fab857ccfa5f23e4fd1c30d07ca0

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    63KB

    MD5

    8bd26e2c20f1583ff5f0cc7c8bb716c3

    SHA1

    ed16d9d0b36d9b84fdcfa990e1204666e2f807d8

    SHA256

    4a62549ae562b1d0adea1089abf1cfead7e4aa9cbb79a4dded7f83f477ef0fa9

    SHA512

    410b9d934c548e35a0e3461ac226b892e75fd6b3f1683df05d49d526850ec31336d63667eaa1a2e6e2099066d73eedde4538fab857ccfa5f23e4fd1c30d07ca0

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    63KB

    MD5

    8bd26e2c20f1583ff5f0cc7c8bb716c3

    SHA1

    ed16d9d0b36d9b84fdcfa990e1204666e2f807d8

    SHA256

    4a62549ae562b1d0adea1089abf1cfead7e4aa9cbb79a4dded7f83f477ef0fa9

    SHA512

    410b9d934c548e35a0e3461ac226b892e75fd6b3f1683df05d49d526850ec31336d63667eaa1a2e6e2099066d73eedde4538fab857ccfa5f23e4fd1c30d07ca0

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    63KB

    MD5

    8bd26e2c20f1583ff5f0cc7c8bb716c3

    SHA1

    ed16d9d0b36d9b84fdcfa990e1204666e2f807d8

    SHA256

    4a62549ae562b1d0adea1089abf1cfead7e4aa9cbb79a4dded7f83f477ef0fa9

    SHA512

    410b9d934c548e35a0e3461ac226b892e75fd6b3f1683df05d49d526850ec31336d63667eaa1a2e6e2099066d73eedde4538fab857ccfa5f23e4fd1c30d07ca0

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    63KB

    MD5

    8bd26e2c20f1583ff5f0cc7c8bb716c3

    SHA1

    ed16d9d0b36d9b84fdcfa990e1204666e2f807d8

    SHA256

    4a62549ae562b1d0adea1089abf1cfead7e4aa9cbb79a4dded7f83f477ef0fa9

    SHA512

    410b9d934c548e35a0e3461ac226b892e75fd6b3f1683df05d49d526850ec31336d63667eaa1a2e6e2099066d73eedde4538fab857ccfa5f23e4fd1c30d07ca0

  • memory/2280-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2280-10-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB