Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2023 09:08

General

  • Target

    NEAS.77d814a38abc3c61439c7796212d2690.exe

  • Size

    132KB

  • MD5

    77d814a38abc3c61439c7796212d2690

  • SHA1

    6e7f140b67172dc1aa5537f20105b92386cadc9d

  • SHA256

    ec27f1ca119792f6402223cf375a176989f9f90058d22d2d6c55a62ba97df612

  • SHA512

    33f86812587623fe148d86b60146a162ad4db1cbe8dbe5d92bed917fc92352fd6343a801141df2f36f458f24f3d5fe5545d1e80d4ff89c418d6fea4f68d7d708

  • SSDEEP

    3072:tY9CUT62/UOVMgJsgJMgJogJwgJ0zqgJ01J3RgJ01JygJ01JK8gJ01JK2gJ01JKf:tY9C8QyFJlJFJRJZJqJyJ3CJyJbJyJWP

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.77d814a38abc3c61439c7796212d2690.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.77d814a38abc3c61439c7796212d2690.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    132KB

    MD5

    2b97e1cb24b0f3f1a120576c04622e58

    SHA1

    2264499064afca0c3b0e3235f5a191c466bbe475

    SHA256

    18a37e4bf9884409a0f1e97ba656803d01e727f9b50741a4e95c93185ec10096

    SHA512

    257bf4a902ea60f8b90c8adf29d1391193de5d4fe2fe91e3343b766a1aa35bdd1613d5d55b16ba3c100f0ee2f7e376af9d5b6380558e64bc22241dae41e5b94f

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    132KB

    MD5

    2b97e1cb24b0f3f1a120576c04622e58

    SHA1

    2264499064afca0c3b0e3235f5a191c466bbe475

    SHA256

    18a37e4bf9884409a0f1e97ba656803d01e727f9b50741a4e95c93185ec10096

    SHA512

    257bf4a902ea60f8b90c8adf29d1391193de5d4fe2fe91e3343b766a1aa35bdd1613d5d55b16ba3c100f0ee2f7e376af9d5b6380558e64bc22241dae41e5b94f

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    132KB

    MD5

    2b97e1cb24b0f3f1a120576c04622e58

    SHA1

    2264499064afca0c3b0e3235f5a191c466bbe475

    SHA256

    18a37e4bf9884409a0f1e97ba656803d01e727f9b50741a4e95c93185ec10096

    SHA512

    257bf4a902ea60f8b90c8adf29d1391193de5d4fe2fe91e3343b766a1aa35bdd1613d5d55b16ba3c100f0ee2f7e376af9d5b6380558e64bc22241dae41e5b94f

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    132KB

    MD5

    2b97e1cb24b0f3f1a120576c04622e58

    SHA1

    2264499064afca0c3b0e3235f5a191c466bbe475

    SHA256

    18a37e4bf9884409a0f1e97ba656803d01e727f9b50741a4e95c93185ec10096

    SHA512

    257bf4a902ea60f8b90c8adf29d1391193de5d4fe2fe91e3343b766a1aa35bdd1613d5d55b16ba3c100f0ee2f7e376af9d5b6380558e64bc22241dae41e5b94f

  • \Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    132KB

    MD5

    2b97e1cb24b0f3f1a120576c04622e58

    SHA1

    2264499064afca0c3b0e3235f5a191c466bbe475

    SHA256

    18a37e4bf9884409a0f1e97ba656803d01e727f9b50741a4e95c93185ec10096

    SHA512

    257bf4a902ea60f8b90c8adf29d1391193de5d4fe2fe91e3343b766a1aa35bdd1613d5d55b16ba3c100f0ee2f7e376af9d5b6380558e64bc22241dae41e5b94f

  • memory/2376-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2376-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2376-11-0x0000000002FA0000-0x0000000002FC6000-memory.dmp

    Filesize

    152KB

  • memory/2376-10-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2764-13-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB