Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2023 02:11

General

  • Target

    NEAS.5a3615f1082ed27e84261b9f764d84b0.exe

  • Size

    44KB

  • MD5

    5a3615f1082ed27e84261b9f764d84b0

  • SHA1

    ab821534a7e1ec5f324315191eb396e26b5b4728

  • SHA256

    d15d9bcf96d61289f50167bed89323cff61bab66b44d14f435885a5a7aac4a88

  • SHA512

    061eaaea4123da36b5ab7278c4b1680d0d14b46ba745b4194b3891eb2ba2eb35f16d8d095f6c93a8b5858cd107a83f9d3be754da4a613181f4f18b57f723e6ea

  • SSDEEP

    768:v+dAURFxna4QAPQlYgkFlplVDuyUylyylylytlylySyPyb+L7Gdr/5syyoEdylYv:v6wosj+swSde800a

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5a3615f1082ed27e84261b9f764d84b0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5a3615f1082ed27e84261b9f764d84b0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    44KB

    MD5

    10e4e6daf9fca4be06bf309f9eeff88d

    SHA1

    328d5316ae9c697bb9b1f172f63f8b56dfab56ba

    SHA256

    d1532b80f25855cd464f2d72c217fc0bb92575d6af0a1e5e2bd4f7ac8ccac290

    SHA512

    7cd55c14f60d410fe7f049ed4307f824e4f7ecf0f1a82a5f446337547e446cfedab0623875573793a46d33d291b32c47ae9428b2b7abdb96a4dd0e8ec7cf4617

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    44KB

    MD5

    10e4e6daf9fca4be06bf309f9eeff88d

    SHA1

    328d5316ae9c697bb9b1f172f63f8b56dfab56ba

    SHA256

    d1532b80f25855cd464f2d72c217fc0bb92575d6af0a1e5e2bd4f7ac8ccac290

    SHA512

    7cd55c14f60d410fe7f049ed4307f824e4f7ecf0f1a82a5f446337547e446cfedab0623875573793a46d33d291b32c47ae9428b2b7abdb96a4dd0e8ec7cf4617

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    44KB

    MD5

    10e4e6daf9fca4be06bf309f9eeff88d

    SHA1

    328d5316ae9c697bb9b1f172f63f8b56dfab56ba

    SHA256

    d1532b80f25855cd464f2d72c217fc0bb92575d6af0a1e5e2bd4f7ac8ccac290

    SHA512

    7cd55c14f60d410fe7f049ed4307f824e4f7ecf0f1a82a5f446337547e446cfedab0623875573793a46d33d291b32c47ae9428b2b7abdb96a4dd0e8ec7cf4617

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    44KB

    MD5

    10e4e6daf9fca4be06bf309f9eeff88d

    SHA1

    328d5316ae9c697bb9b1f172f63f8b56dfab56ba

    SHA256

    d1532b80f25855cd464f2d72c217fc0bb92575d6af0a1e5e2bd4f7ac8ccac290

    SHA512

    7cd55c14f60d410fe7f049ed4307f824e4f7ecf0f1a82a5f446337547e446cfedab0623875573793a46d33d291b32c47ae9428b2b7abdb96a4dd0e8ec7cf4617

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    44KB

    MD5

    10e4e6daf9fca4be06bf309f9eeff88d

    SHA1

    328d5316ae9c697bb9b1f172f63f8b56dfab56ba

    SHA256

    d1532b80f25855cd464f2d72c217fc0bb92575d6af0a1e5e2bd4f7ac8ccac290

    SHA512

    7cd55c14f60d410fe7f049ed4307f824e4f7ecf0f1a82a5f446337547e446cfedab0623875573793a46d33d291b32c47ae9428b2b7abdb96a4dd0e8ec7cf4617