Analysis

  • max time kernel
    178s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 19:54

General

  • Target

    NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe

  • Size

    90KB

  • MD5

    ed6dab10c1205510eae2d8d36ed3af10

  • SHA1

    ac73057a00f39e019cb5655334f247f7d2abe443

  • SHA256

    e6b6209f29fe27bddcd4d2b26f619be60484267e99e852eb5412ff0dfb862a04

  • SHA512

    94c6b082061fcc15537d05796f50fd4c78898f036cd44e8dff91cba097dde4834af1dbaca7377457d0e6d641282196be1aa65a8d2a29aec3cd557cd45d9e31b9

  • SSDEEP

    1536:DY9jw/dUT62rGdiUOWWrMbtebtfJibtfJnt8btfJntqgbtfJntqotg0RN:DY9CUT62/UOVMbkb1Jib1Jnib1Jnwgbh

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:4892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    90KB

    MD5

    ceacab4223989e1b0b62796a1fa0bc8b

    SHA1

    487b071cb9b699252823f726d6dce402ca08f664

    SHA256

    e1257cd15e3c96bc5f909a4bd4146b328fe13d87986403e8305b0e098968fe2c

    SHA512

    0775637a5c53e39b174675021972c1c5bc1f15eddd5f02cc02b80bd411411150a699f2432065588a37df09e0fafe76f8fa87d84c4b221234d0a0cbcf493d21c3

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    90KB

    MD5

    ceacab4223989e1b0b62796a1fa0bc8b

    SHA1

    487b071cb9b699252823f726d6dce402ca08f664

    SHA256

    e1257cd15e3c96bc5f909a4bd4146b328fe13d87986403e8305b0e098968fe2c

    SHA512

    0775637a5c53e39b174675021972c1c5bc1f15eddd5f02cc02b80bd411411150a699f2432065588a37df09e0fafe76f8fa87d84c4b221234d0a0cbcf493d21c3

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    90KB

    MD5

    ceacab4223989e1b0b62796a1fa0bc8b

    SHA1

    487b071cb9b699252823f726d6dce402ca08f664

    SHA256

    e1257cd15e3c96bc5f909a4bd4146b328fe13d87986403e8305b0e098968fe2c

    SHA512

    0775637a5c53e39b174675021972c1c5bc1f15eddd5f02cc02b80bd411411150a699f2432065588a37df09e0fafe76f8fa87d84c4b221234d0a0cbcf493d21c3

  • memory/1780-0-0x00000000007D0000-0x00000000007D1000-memory.dmp

    Filesize

    4KB