Analysis
-
max time kernel
152s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 02:11
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5a3615f1082ed27e84261b9f764d84b0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.5a3615f1082ed27e84261b9f764d84b0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.5a3615f1082ed27e84261b9f764d84b0.exe
-
Size
44KB
-
MD5
5a3615f1082ed27e84261b9f764d84b0
-
SHA1
ab821534a7e1ec5f324315191eb396e26b5b4728
-
SHA256
d15d9bcf96d61289f50167bed89323cff61bab66b44d14f435885a5a7aac4a88
-
SHA512
061eaaea4123da36b5ab7278c4b1680d0d14b46ba745b4194b3891eb2ba2eb35f16d8d095f6c93a8b5858cd107a83f9d3be754da4a613181f4f18b57f723e6ea
-
SSDEEP
768:v+dAURFxna4QAPQlYgkFlplVDuyUylyylylytlylySyPyb+L7Gdr/5syyoEdylYv:v6wosj+swSde800a
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation NEAS.5a3615f1082ed27e84261b9f764d84b0.exe -
Executes dropped EXE 1 IoCs
pid Process 492 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4652 wrote to memory of 492 4652 NEAS.5a3615f1082ed27e84261b9f764d84b0.exe 90 PID 4652 wrote to memory of 492 4652 NEAS.5a3615f1082ed27e84261b9f764d84b0.exe 90 PID 4652 wrote to memory of 492 4652 NEAS.5a3615f1082ed27e84261b9f764d84b0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5a3615f1082ed27e84261b9f764d84b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5a3615f1082ed27e84261b9f764d84b0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD510e4e6daf9fca4be06bf309f9eeff88d
SHA1328d5316ae9c697bb9b1f172f63f8b56dfab56ba
SHA256d1532b80f25855cd464f2d72c217fc0bb92575d6af0a1e5e2bd4f7ac8ccac290
SHA5127cd55c14f60d410fe7f049ed4307f824e4f7ecf0f1a82a5f446337547e446cfedab0623875573793a46d33d291b32c47ae9428b2b7abdb96a4dd0e8ec7cf4617
-
Filesize
44KB
MD510e4e6daf9fca4be06bf309f9eeff88d
SHA1328d5316ae9c697bb9b1f172f63f8b56dfab56ba
SHA256d1532b80f25855cd464f2d72c217fc0bb92575d6af0a1e5e2bd4f7ac8ccac290
SHA5127cd55c14f60d410fe7f049ed4307f824e4f7ecf0f1a82a5f446337547e446cfedab0623875573793a46d33d291b32c47ae9428b2b7abdb96a4dd0e8ec7cf4617
-
Filesize
44KB
MD510e4e6daf9fca4be06bf309f9eeff88d
SHA1328d5316ae9c697bb9b1f172f63f8b56dfab56ba
SHA256d1532b80f25855cd464f2d72c217fc0bb92575d6af0a1e5e2bd4f7ac8ccac290
SHA5127cd55c14f60d410fe7f049ed4307f824e4f7ecf0f1a82a5f446337547e446cfedab0623875573793a46d33d291b32c47ae9428b2b7abdb96a4dd0e8ec7cf4617