Analysis
-
max time kernel
1799s -
max time network
1688s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06-08-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
zaro.bat
Resource
win10-20230703-en
General
-
Target
zaro.bat
-
Size
546B
-
MD5
0ae3e5cd10bb7807dbf507ad66294dca
-
SHA1
402593b2b6b9c5f764746216692c860d83a14f38
-
SHA256
5e73e1b8bf0a6441ecfed07580a131a0f9d4ffc61421c686fd2551627096ef79
-
SHA512
a4dca6a201c449c1a250772f689d63f2b9764645737d3f0de7027f72aa24f0b177251bf41fd3d2326cf5b17fd8f4b7e1e27ff73b03e90f62c38f55c09366cc6a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133358139600181176" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 620 chrome.exe 620 chrome.exe 2472 chrome.exe 2472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 620 chrome.exe 620 chrome.exe 620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe Token: SeShutdownPrivilege 620 chrome.exe Token: SeCreatePagefilePrivilege 620 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe 620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1124 wrote to memory of 620 1124 cmd.exe 71 PID 1124 wrote to memory of 620 1124 cmd.exe 71 PID 620 wrote to memory of 2512 620 chrome.exe 73 PID 620 wrote to memory of 2512 620 chrome.exe 73 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 1556 620 chrome.exe 79 PID 620 wrote to memory of 2196 620 chrome.exe 75 PID 620 wrote to memory of 2196 620 chrome.exe 75 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76 PID 620 wrote to memory of 4784 620 chrome.exe 76
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\zaro.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "!links[5]!"2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffadd6d9758,0x7ffadd6d9768,0x7ffadd6d97783⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:83⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:83⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:13⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:13⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:23⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4500 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:13⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4684 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:83⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:83⤵PID:204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:83⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4968 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:83⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:83⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1848,i,2852073153097464734,1853951999170424891,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50873e5a0bad977d21dcbc02273d0d245
SHA1f5d9d9d5671f9a07b07850a055f92ead049624e7
SHA256343ef89f76b1bc785151aa515165e79dda9d82b70ccd6fd870f3b5bf4fe6f631
SHA512c310dd72447044eb7ffd6713b63349b9c30c348af85547caba158f5826e7bf6b492ee98e64495ce1b68616d387dcd760798f50dd4d0482475360a29928b7dcaf
-
Filesize
1KB
MD569b7ada88a43644647ea4ec3e32e507b
SHA1ec1260558a8ed528cc535abe273ce6745a482dbf
SHA25630526243ca4ad541c43848fb34833fda4a691eff11164afc1fd9e61be3f157a2
SHA512834b8e4b2efc4dea408deceb65641b765bd2ba18532575a9d9ba5a016da71ffd6bcfe56ae02489fff318b88f4da99d890bbfa68f9f94b5b1c6003885ff552c77
-
Filesize
371B
MD5e4e410150efb55625cd331e6d08bddcc
SHA1a437ff004b9dda05821ea3dc47ce7afd4abec5a8
SHA25665c970e4e9d6d6631198e25a796e69926c5ca28f581f1405e5947912a5257b54
SHA512761ecd0d9c1d28dc8eca397f26edbd212af7d467cdcbfc5cafd463d0905b71314feab695a615c382d7eaed6954403a5c2a4e3c9b3a69ae93c20311db1b823983
-
Filesize
5KB
MD5bd6c633dc6cc54f13043c0e74012af80
SHA1aa0d8c4a4698e0989d72613009563113e180289e
SHA2565b30e990c04c0f9b36f15d1f08f87c4076de16100156f3622be1b3749acb5e2b
SHA512a17b3a687782c078f51a66b546a479b12fee493cbca9d8a59f2e8f913ff8431b62a0e2c36cfea820e53c7500ecbd4cc600f04feadf687349f37a9446f06f67fe
-
Filesize
5KB
MD5515804a4dfeb94d856d5f3c169946078
SHA1e54177922e9ab005f4b5d813acad011d2159d50f
SHA256ba670d24e2d3365b0d93bdb2683f8e1c4d53db3ccd1bdce0b4f6e39e6bcab149
SHA512f1fcdcecb01b6181c2a339d7d174e5b1c08576a1fcaae444f24b85e8dc6bea0022ae74a8ecb3baa2df6832b719bf9f7097fb8f091ab54b9010e6278dda9cc0b2
-
Filesize
5KB
MD516cb394926c9fa8fb65f3ee25db9b6f3
SHA1eb08680999fdafcb1703ed56f7a42696dd397bde
SHA2568c443756d8e1a789a6174839e1c02f4469d191cfdac837d8c73ead60d7e84d6a
SHA5127340c7afd5b191597a0087f3f99965955389c601343ec3e6d8bb4a6b341dacb499ab68d032d4abdd8d4ea10019709cd19f9bb2f58c2f1599623160ffd2a3fd3f
-
Filesize
12KB
MD56bd3305ca1ded2de0c23dc0dbe0f7ab2
SHA18f4f6e12f76f3d79d53a619335f8671008cbd0f2
SHA25630963f22e424a1af84d4c8fc554ac91111ab6728e79efc68e82f23648459b15c
SHA5127d2197d6cf597a21d18e2e8c20c126ef29292792b46b32dd81376c0309db6ff78a3bbb524e370f47557c9ad830e2a49a2a2dc95c9ab40a7c8042951225a8b62a
-
Filesize
177KB
MD5860b86b35eb2ff16a4d179344cf6c384
SHA1999ca90467eefdefb9758aab4eaec258de82b946
SHA256ca0f0e9647134d81226c119fa086379692a74ce2a388319deeb00c5a72008eb8
SHA512ca87985a4a253948d6ac869543a58387ccf5558bfc217828cf568dd92b2e663da226dbf2114848d0261c67c215348c8c659b023f8b97c8f2e302884ad460142b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd