Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 03:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe
-
Size
131KB
-
MD5
b3b2be5bec1ba8320161adba14d8d2d0
-
SHA1
c0f844a7b70e0a9ce6b354fc91b0daf9c32da417
-
SHA256
8316e33afa7fe65a607643fd78c58756a3a142bc326241b5fd47a3cd403c1815
-
SHA512
5cb1a72e1eed2625d48ea4464839a2fbc5408d10f47bf55b4061e4c397c3422494b14c2c2db4d91f83ec443e0f226d37a4b323e2a4c5c64a6e7841f1b51c0451
-
SSDEEP
3072:tY9CUT62/UOVMgJsgJMgJogJwgJ0zqgJ01J3RgJ01JygJ01JK8gJ01JK2gJ01JKa:tY9C8QyFJlJFJRJZJqJyJ3CJyJbJyJWq
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe -
Executes dropped EXE 1 IoCs
pid Process 3528 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3528 2112 NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe 93 PID 2112 wrote to memory of 3528 2112 NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe 93 PID 2112 wrote to memory of 3528 2112 NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b3b2be5bec1ba8320161adba14d8d2d0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:3528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD54de734e83e711edc236fcb1d456d382a
SHA13b57644d909880f650a057a70aeb047fe59526f4
SHA25657178ac3880021ba48800dc629b510cd076ec13920abfab55d3f01ad6c567289
SHA51284a02a5a9d8504c1a98b2c1b3c947548acd533f0fd1ee183999c03d217d990db0d04d4dff745b231f526feed9d2c36adaa703f7ab41afff1d21345205ef2c15d
-
Filesize
131KB
MD54de734e83e711edc236fcb1d456d382a
SHA13b57644d909880f650a057a70aeb047fe59526f4
SHA25657178ac3880021ba48800dc629b510cd076ec13920abfab55d3f01ad6c567289
SHA51284a02a5a9d8504c1a98b2c1b3c947548acd533f0fd1ee183999c03d217d990db0d04d4dff745b231f526feed9d2c36adaa703f7ab41afff1d21345205ef2c15d
-
Filesize
131KB
MD54de734e83e711edc236fcb1d456d382a
SHA13b57644d909880f650a057a70aeb047fe59526f4
SHA25657178ac3880021ba48800dc629b510cd076ec13920abfab55d3f01ad6c567289
SHA51284a02a5a9d8504c1a98b2c1b3c947548acd533f0fd1ee183999c03d217d990db0d04d4dff745b231f526feed9d2c36adaa703f7ab41afff1d21345205ef2c15d