Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 07:02
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.60d4eef014fa37a87ad389ab17fcca40.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.60d4eef014fa37a87ad389ab17fcca40.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.60d4eef014fa37a87ad389ab17fcca40.exe
-
Size
291KB
-
MD5
60d4eef014fa37a87ad389ab17fcca40
-
SHA1
a6c22a1482b5a45b6b818397fc5fda09d7316f4c
-
SHA256
885645cf1a525da5964bc13dd1b4cfcb6b264ea63c3fd4851a04d37cea4fff11
-
SHA512
addc40b253e7ff1a8d0a7db04867b88ce85f9f2007dbd72090c7bb4eb0d25db3a6ef47353064898a373f68aff774f1beacd6d4e69768a38277f86182cbd7f397
-
SSDEEP
3072:GY9CUT62/UOVNu5YKZmRoWM4pkcrIobbZ5QzN2Vs/2xdqWnaf+y6SiG/sMFvkzX/:GY9C8QyNRQbobbfQ8V+W7MeO8l53
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation NEAS.60d4eef014fa37a87ad389ab17fcca40.exe -
Executes dropped EXE 1 IoCs
pid Process 4448 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2668 wrote to memory of 4448 2668 NEAS.60d4eef014fa37a87ad389ab17fcca40.exe 90 PID 2668 wrote to memory of 4448 2668 NEAS.60d4eef014fa37a87ad389ab17fcca40.exe 90 PID 2668 wrote to memory of 4448 2668 NEAS.60d4eef014fa37a87ad389ab17fcca40.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.60d4eef014fa37a87ad389ab17fcca40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.60d4eef014fa37a87ad389ab17fcca40.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD538b9b42e890c85baad172c6c2dc6c15d
SHA15d213c7894fdf30e09cf04937fd08cd62a3250b6
SHA256c2e6e7829c27a2065f37adcfe5375a41ec24449f7d89f07eb45755e1f3dbb608
SHA51268d7b99f15830c35c1cb3d59814ce1490bdcfbc9d4842438cca091123611dbf9694fe065bdc3e9aa565ec7af11a369d81607edd46da8c3f933ad7604047f19f3
-
Filesize
292KB
MD538b9b42e890c85baad172c6c2dc6c15d
SHA15d213c7894fdf30e09cf04937fd08cd62a3250b6
SHA256c2e6e7829c27a2065f37adcfe5375a41ec24449f7d89f07eb45755e1f3dbb608
SHA51268d7b99f15830c35c1cb3d59814ce1490bdcfbc9d4842438cca091123611dbf9694fe065bdc3e9aa565ec7af11a369d81607edd46da8c3f933ad7604047f19f3
-
Filesize
292KB
MD538b9b42e890c85baad172c6c2dc6c15d
SHA15d213c7894fdf30e09cf04937fd08cd62a3250b6
SHA256c2e6e7829c27a2065f37adcfe5375a41ec24449f7d89f07eb45755e1f3dbb608
SHA51268d7b99f15830c35c1cb3d59814ce1490bdcfbc9d4842438cca091123611dbf9694fe065bdc3e9aa565ec7af11a369d81607edd46da8c3f933ad7604047f19f3