Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2023 05:29

General

  • Target

    NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe

  • Size

    131KB

  • MD5

    ad268e1e434d8c2474bbdf3af40f2020

  • SHA1

    88cf3d913a5ec811bc240fab449d95f7fc49b1fd

  • SHA256

    7d272e637a188b6c1bcc8851eba8fd0d68e4f33c8627c3397c3acafb0d2b8783

  • SHA512

    69966efe71465abb35ab5345aa42356946b238396f66045e9293e5485c93c18e8777f7e4e0b8439320d0d37cf338b7cdb3e6d13029c82f22cb26771275fa20b7

  • SSDEEP

    3072:tY9CUT62/UOVMgJsgJMgJogJwgJ0zqgJ01J3RgJ01JygJ01JK8gJ01JK2gJ01JKh:tY9C8QyFJlJFJRJZJqJyJ3CJyJbJyJWR

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    5a815e12dba080b33295a1ca1c1fec7e

    SHA1

    06c9a59ea77c93cc2161121e96f8d0acb9ffe7e9

    SHA256

    d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25

    SHA512

    d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    5a815e12dba080b33295a1ca1c1fec7e

    SHA1

    06c9a59ea77c93cc2161121e96f8d0acb9ffe7e9

    SHA256

    d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25

    SHA512

    d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    5a815e12dba080b33295a1ca1c1fec7e

    SHA1

    06c9a59ea77c93cc2161121e96f8d0acb9ffe7e9

    SHA256

    d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25

    SHA512

    d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    5a815e12dba080b33295a1ca1c1fec7e

    SHA1

    06c9a59ea77c93cc2161121e96f8d0acb9ffe7e9

    SHA256

    d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25

    SHA512

    d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    5a815e12dba080b33295a1ca1c1fec7e

    SHA1

    06c9a59ea77c93cc2161121e96f8d0acb9ffe7e9

    SHA256

    d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25

    SHA512

    d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9

  • memory/2572-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2572-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2572-10-0x00000000005C0000-0x00000000005E6000-memory.dmp

    Filesize

    152KB

  • memory/2572-11-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/3016-13-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB