Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 05:29
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe
-
Size
131KB
-
MD5
ad268e1e434d8c2474bbdf3af40f2020
-
SHA1
88cf3d913a5ec811bc240fab449d95f7fc49b1fd
-
SHA256
7d272e637a188b6c1bcc8851eba8fd0d68e4f33c8627c3397c3acafb0d2b8783
-
SHA512
69966efe71465abb35ab5345aa42356946b238396f66045e9293e5485c93c18e8777f7e4e0b8439320d0d37cf338b7cdb3e6d13029c82f22cb26771275fa20b7
-
SSDEEP
3072:tY9CUT62/UOVMgJsgJMgJogJwgJ0zqgJ01J3RgJ01JygJ01JK8gJ01JK2gJ01JKh:tY9C8QyFJlJFJRJZJqJyJ3CJyJbJyJWR
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 3016 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2572 NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe 2572 NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3016 2572 NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe 28 PID 2572 wrote to memory of 3016 2572 NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe 28 PID 2572 wrote to memory of 3016 2572 NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe 28 PID 2572 wrote to memory of 3016 2572 NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ad268e1e434d8c2474bbdf3af40f2020_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD55a815e12dba080b33295a1ca1c1fec7e
SHA106c9a59ea77c93cc2161121e96f8d0acb9ffe7e9
SHA256d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25
SHA512d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9
-
Filesize
131KB
MD55a815e12dba080b33295a1ca1c1fec7e
SHA106c9a59ea77c93cc2161121e96f8d0acb9ffe7e9
SHA256d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25
SHA512d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9
-
Filesize
131KB
MD55a815e12dba080b33295a1ca1c1fec7e
SHA106c9a59ea77c93cc2161121e96f8d0acb9ffe7e9
SHA256d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25
SHA512d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9
-
Filesize
131KB
MD55a815e12dba080b33295a1ca1c1fec7e
SHA106c9a59ea77c93cc2161121e96f8d0acb9ffe7e9
SHA256d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25
SHA512d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9
-
Filesize
131KB
MD55a815e12dba080b33295a1ca1c1fec7e
SHA106c9a59ea77c93cc2161121e96f8d0acb9ffe7e9
SHA256d845a00c9d304a49d0f0c7b6e99b35e47585f119c2afa29856a433f390b68d25
SHA512d662933c323a83d12e2c6e037dcf999a8a327bbca5b58ad8a6fa99ac805e24f6b6db41b4dd8a14b8c9bd30af7866af4a2cfce7df4f23f336ef3f92993eebfda9