Analysis
-
max time kernel
178s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 19:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe
-
Size
90KB
-
MD5
ed6dab10c1205510eae2d8d36ed3af10
-
SHA1
ac73057a00f39e019cb5655334f247f7d2abe443
-
SHA256
e6b6209f29fe27bddcd4d2b26f619be60484267e99e852eb5412ff0dfb862a04
-
SHA512
94c6b082061fcc15537d05796f50fd4c78898f036cd44e8dff91cba097dde4834af1dbaca7377457d0e6d641282196be1aa65a8d2a29aec3cd557cd45d9e31b9
-
SSDEEP
1536:DY9jw/dUT62rGdiUOWWrMbtebtfJibtfJnt8btfJntqgbtfJntqotg0RN:DY9CUT62/UOVMbkb1Jib1Jnib1Jnwgbh
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe -
Executes dropped EXE 1 IoCs
pid Process 4892 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4892 1780 NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe 93 PID 1780 wrote to memory of 4892 1780 NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe 93 PID 1780 wrote to memory of 4892 1780 NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ed6dab10c1205510eae2d8d36ed3af10.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5ceacab4223989e1b0b62796a1fa0bc8b
SHA1487b071cb9b699252823f726d6dce402ca08f664
SHA256e1257cd15e3c96bc5f909a4bd4146b328fe13d87986403e8305b0e098968fe2c
SHA5120775637a5c53e39b174675021972c1c5bc1f15eddd5f02cc02b80bd411411150a699f2432065588a37df09e0fafe76f8fa87d84c4b221234d0a0cbcf493d21c3
-
Filesize
90KB
MD5ceacab4223989e1b0b62796a1fa0bc8b
SHA1487b071cb9b699252823f726d6dce402ca08f664
SHA256e1257cd15e3c96bc5f909a4bd4146b328fe13d87986403e8305b0e098968fe2c
SHA5120775637a5c53e39b174675021972c1c5bc1f15eddd5f02cc02b80bd411411150a699f2432065588a37df09e0fafe76f8fa87d84c4b221234d0a0cbcf493d21c3
-
Filesize
90KB
MD5ceacab4223989e1b0b62796a1fa0bc8b
SHA1487b071cb9b699252823f726d6dce402ca08f664
SHA256e1257cd15e3c96bc5f909a4bd4146b328fe13d87986403e8305b0e098968fe2c
SHA5120775637a5c53e39b174675021972c1c5bc1f15eddd5f02cc02b80bd411411150a699f2432065588a37df09e0fafe76f8fa87d84c4b221234d0a0cbcf493d21c3