Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 14:17
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe
-
Size
43KB
-
MD5
b0764a5e24c0ab081b543d4ac9ca7b40
-
SHA1
27659ce209165584fdaea6d08b58d1df19f4f0bb
-
SHA256
4b52458363abc72930122709e53bb9c99e5ec496f3980f4dfbb214e8708caa53
-
SHA512
8004ca24e67eaae53fdec41dc641f30c48f2da11ef48a521d68202a403c168c14adf454abe80412de95dfbc3e85a8ecd00726477a09fb5238b84713a5c70b946
-
SSDEEP
768:v+dAURFxna4QAPQlYgkFlplVDuyUylyylylytlylySyPyb+L7Gdr/5syyoEdylYg:v6wosj+swSde80A
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 1740 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe 2080 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1740 2080 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe 28 PID 2080 wrote to memory of 1740 2080 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe 28 PID 2080 wrote to memory of 1740 2080 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe 28 PID 2080 wrote to memory of 1740 2080 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD52797dbfd935995d171d1d6cea4a8eeac
SHA187be17a7d008a559a1c7492bcf92cfad30ad7b5f
SHA256f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b
SHA5129086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351
-
Filesize
43KB
MD52797dbfd935995d171d1d6cea4a8eeac
SHA187be17a7d008a559a1c7492bcf92cfad30ad7b5f
SHA256f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b
SHA5129086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351
-
Filesize
43KB
MD52797dbfd935995d171d1d6cea4a8eeac
SHA187be17a7d008a559a1c7492bcf92cfad30ad7b5f
SHA256f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b
SHA5129086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351
-
Filesize
43KB
MD52797dbfd935995d171d1d6cea4a8eeac
SHA187be17a7d008a559a1c7492bcf92cfad30ad7b5f
SHA256f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b
SHA5129086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351
-
Filesize
43KB
MD52797dbfd935995d171d1d6cea4a8eeac
SHA187be17a7d008a559a1c7492bcf92cfad30ad7b5f
SHA256f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b
SHA5129086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351