Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 14:17
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe
-
Size
43KB
-
MD5
b0764a5e24c0ab081b543d4ac9ca7b40
-
SHA1
27659ce209165584fdaea6d08b58d1df19f4f0bb
-
SHA256
4b52458363abc72930122709e53bb9c99e5ec496f3980f4dfbb214e8708caa53
-
SHA512
8004ca24e67eaae53fdec41dc641f30c48f2da11ef48a521d68202a403c168c14adf454abe80412de95dfbc3e85a8ecd00726477a09fb5238b84713a5c70b946
-
SSDEEP
768:v+dAURFxna4QAPQlYgkFlplVDuyUylyylylytlylySyPyb+L7Gdr/5syyoEdylYg:v6wosj+swSde80A
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe -
Executes dropped EXE 1 IoCs
pid Process 3140 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 3140 436 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe 87 PID 436 wrote to memory of 3140 436 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe 87 PID 436 wrote to memory of 3140 436 NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:3140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD52797dbfd935995d171d1d6cea4a8eeac
SHA187be17a7d008a559a1c7492bcf92cfad30ad7b5f
SHA256f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b
SHA5129086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351
-
Filesize
43KB
MD52797dbfd935995d171d1d6cea4a8eeac
SHA187be17a7d008a559a1c7492bcf92cfad30ad7b5f
SHA256f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b
SHA5129086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351
-
Filesize
43KB
MD52797dbfd935995d171d1d6cea4a8eeac
SHA187be17a7d008a559a1c7492bcf92cfad30ad7b5f
SHA256f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b
SHA5129086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351