Analysis

  • max time kernel
    157s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2023 03:14

General

  • Target

    NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe

  • Size

    131KB

  • MD5

    b3b2be5bec1ba8320161adba14d8d2d0

  • SHA1

    c0f844a7b70e0a9ce6b354fc91b0daf9c32da417

  • SHA256

    8316e33afa7fe65a607643fd78c58756a3a142bc326241b5fd47a3cd403c1815

  • SHA512

    5cb1a72e1eed2625d48ea4464839a2fbc5408d10f47bf55b4061e4c397c3422494b14c2c2db4d91f83ec443e0f226d37a4b323e2a4c5c64a6e7841f1b51c0451

  • SSDEEP

    3072:tY9CUT62/UOVMgJsgJMgJogJwgJ0zqgJ01J3RgJ01JygJ01JK8gJ01JK2gJ01JKa:tY9C8QyFJlJFJRJZJqJyJ3CJyJbJyJWq

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    4de734e83e711edc236fcb1d456d382a

    SHA1

    3b57644d909880f650a057a70aeb047fe59526f4

    SHA256

    57178ac3880021ba48800dc629b510cd076ec13920abfab55d3f01ad6c567289

    SHA512

    84a02a5a9d8504c1a98b2c1b3c947548acd533f0fd1ee183999c03d217d990db0d04d4dff745b231f526feed9d2c36adaa703f7ab41afff1d21345205ef2c15d

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    4de734e83e711edc236fcb1d456d382a

    SHA1

    3b57644d909880f650a057a70aeb047fe59526f4

    SHA256

    57178ac3880021ba48800dc629b510cd076ec13920abfab55d3f01ad6c567289

    SHA512

    84a02a5a9d8504c1a98b2c1b3c947548acd533f0fd1ee183999c03d217d990db0d04d4dff745b231f526feed9d2c36adaa703f7ab41afff1d21345205ef2c15d

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    4de734e83e711edc236fcb1d456d382a

    SHA1

    3b57644d909880f650a057a70aeb047fe59526f4

    SHA256

    57178ac3880021ba48800dc629b510cd076ec13920abfab55d3f01ad6c567289

    SHA512

    84a02a5a9d8504c1a98b2c1b3c947548acd533f0fd1ee183999c03d217d990db0d04d4dff745b231f526feed9d2c36adaa703f7ab41afff1d21345205ef2c15d

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    4de734e83e711edc236fcb1d456d382a

    SHA1

    3b57644d909880f650a057a70aeb047fe59526f4

    SHA256

    57178ac3880021ba48800dc629b510cd076ec13920abfab55d3f01ad6c567289

    SHA512

    84a02a5a9d8504c1a98b2c1b3c947548acd533f0fd1ee183999c03d217d990db0d04d4dff745b231f526feed9d2c36adaa703f7ab41afff1d21345205ef2c15d

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    131KB

    MD5

    4de734e83e711edc236fcb1d456d382a

    SHA1

    3b57644d909880f650a057a70aeb047fe59526f4

    SHA256

    57178ac3880021ba48800dc629b510cd076ec13920abfab55d3f01ad6c567289

    SHA512

    84a02a5a9d8504c1a98b2c1b3c947548acd533f0fd1ee183999c03d217d990db0d04d4dff745b231f526feed9d2c36adaa703f7ab41afff1d21345205ef2c15d

  • memory/2592-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2592-1-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2592-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2592-11-0x0000000002FE0000-0x0000000003006000-memory.dmp

    Filesize

    152KB

  • memory/2592-14-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2908-13-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2908-16-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB