Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 14:17

General

  • Target

    NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe

  • Size

    43KB

  • MD5

    b0764a5e24c0ab081b543d4ac9ca7b40

  • SHA1

    27659ce209165584fdaea6d08b58d1df19f4f0bb

  • SHA256

    4b52458363abc72930122709e53bb9c99e5ec496f3980f4dfbb214e8708caa53

  • SHA512

    8004ca24e67eaae53fdec41dc641f30c48f2da11ef48a521d68202a403c168c14adf454abe80412de95dfbc3e85a8ecd00726477a09fb5238b84713a5c70b946

  • SSDEEP

    768:v+dAURFxna4QAPQlYgkFlplVDuyUylyylylytlylySyPyb+L7Gdr/5syyoEdylYg:v6wosj+swSde80A

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.b0764a5e24c0ab081b543d4ac9ca7b40.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:3140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    43KB

    MD5

    2797dbfd935995d171d1d6cea4a8eeac

    SHA1

    87be17a7d008a559a1c7492bcf92cfad30ad7b5f

    SHA256

    f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b

    SHA512

    9086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    43KB

    MD5

    2797dbfd935995d171d1d6cea4a8eeac

    SHA1

    87be17a7d008a559a1c7492bcf92cfad30ad7b5f

    SHA256

    f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b

    SHA512

    9086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    43KB

    MD5

    2797dbfd935995d171d1d6cea4a8eeac

    SHA1

    87be17a7d008a559a1c7492bcf92cfad30ad7b5f

    SHA256

    f7e0125b46f69173a1e37324f9d57508976d108c7b2e5602aac9b708efe0ce0b

    SHA512

    9086eb80c85cc3e678bd111324bd668136e4b2f0ad33603aba36a4d3848b73b78d7a38a174038102a7c908b2f181df8e7aab0c3555bc4081e411a7a0b5001351