Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 07:02

General

  • Target

    NEAS.60d4eef014fa37a87ad389ab17fcca40.exe

  • Size

    291KB

  • MD5

    60d4eef014fa37a87ad389ab17fcca40

  • SHA1

    a6c22a1482b5a45b6b818397fc5fda09d7316f4c

  • SHA256

    885645cf1a525da5964bc13dd1b4cfcb6b264ea63c3fd4851a04d37cea4fff11

  • SHA512

    addc40b253e7ff1a8d0a7db04867b88ce85f9f2007dbd72090c7bb4eb0d25db3a6ef47353064898a373f68aff774f1beacd6d4e69768a38277f86182cbd7f397

  • SSDEEP

    3072:GY9CUT62/UOVNu5YKZmRoWM4pkcrIobbZ5QzN2Vs/2xdqWnaf+y6SiG/sMFvkzX/:GY9C8QyNRQbobbfQ8V+W7MeO8l53

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.60d4eef014fa37a87ad389ab17fcca40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.60d4eef014fa37a87ad389ab17fcca40.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:4448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    292KB

    MD5

    38b9b42e890c85baad172c6c2dc6c15d

    SHA1

    5d213c7894fdf30e09cf04937fd08cd62a3250b6

    SHA256

    c2e6e7829c27a2065f37adcfe5375a41ec24449f7d89f07eb45755e1f3dbb608

    SHA512

    68d7b99f15830c35c1cb3d59814ce1490bdcfbc9d4842438cca091123611dbf9694fe065bdc3e9aa565ec7af11a369d81607edd46da8c3f933ad7604047f19f3

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    292KB

    MD5

    38b9b42e890c85baad172c6c2dc6c15d

    SHA1

    5d213c7894fdf30e09cf04937fd08cd62a3250b6

    SHA256

    c2e6e7829c27a2065f37adcfe5375a41ec24449f7d89f07eb45755e1f3dbb608

    SHA512

    68d7b99f15830c35c1cb3d59814ce1490bdcfbc9d4842438cca091123611dbf9694fe065bdc3e9aa565ec7af11a369d81607edd46da8c3f933ad7604047f19f3

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    292KB

    MD5

    38b9b42e890c85baad172c6c2dc6c15d

    SHA1

    5d213c7894fdf30e09cf04937fd08cd62a3250b6

    SHA256

    c2e6e7829c27a2065f37adcfe5375a41ec24449f7d89f07eb45755e1f3dbb608

    SHA512

    68d7b99f15830c35c1cb3d59814ce1490bdcfbc9d4842438cca091123611dbf9694fe065bdc3e9aa565ec7af11a369d81607edd46da8c3f933ad7604047f19f3

  • memory/2668-0-0x00000000005E0000-0x00000000005E1000-memory.dmp

    Filesize

    4KB

  • memory/2668-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4448-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB