Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 07:34

General

  • Target

    01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe

  • Size

    1.6MB

  • MD5

    69dd34b00bb9a8b722f860715adaeb92

  • SHA1

    f751650fd9c5a115394f638ab6f02fd6845deff2

  • SHA256

    01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c

  • SHA512

    f079c7ad594bed5f31dd1f8342442404a2fd4fb977d4d8df9997564e8afe318b66bc6dd6bdb39749a31c20a30d5f91ef169cb5af99500f60f3daed277a9341e8

  • SSDEEP

    24576:Rh7uCEZRy0OhbDfBKYGpLSCKPJwxom9DxKOeGyrM63x6HkKOitJ:X7uCky5KLSbRHaDxveGyrMScHLf

Malware Config

Signatures

  • Detect ZGRat V2 1 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe
    "C:\Users\Admin\AppData\Local\Temp\01bfa9f983bdf585676358024c7e51f30356b72e72b8ddf9af3d3ead16b3f35c.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\18078BFBFF000306D2ECCD33FCwV1\4.jpeg

    Filesize

    65KB

    MD5

    a0230d1f8d2f8343d96fd95aa797e931

    SHA1

    549eca974fed946bc5a6a31960f3685f9ea53e32

    SHA256

    aedbf792ea8af7f94d3b2b2df88375f32077dae327ff8adf00714f6bed0f615a

    SHA512

    84f4595df8934f39b5728a25b073ea77b410d08130df08ccdef98fc04754884600441b6ef84afde1fa9740bde5ca98f617a8a4f24ca7d4c073ac4d70e737b5c6

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Clipboard.txt

    Filesize

    56B

    MD5

    6a62b6c08be34b5cf03bdd09ab93af13

    SHA1

    4ef6885304c05dd230a65121c21f547fdaa65c50

    SHA256

    1d3a06ca4feed11eff3b24b8fd6cfa35a904c0e7133f0a8922032e6eabb6cbb3

    SHA512

    881199acf86264dab873160dbf1452474f744aea00393b868b2080462fba5d095e1bae70c1d8db1dc77b03a8249866d47199628cd291592464f88ded187e1774

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\EmailClients\Outlook\Outlook.txt

    Filesize

    2B

    MD5

    81051bcc2cf1bedf378224b0a93e2877

    SHA1

    ba8ab5a0280b953aa97435ff8946cbcbb2755a27

    SHA256

    7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

    SHA512

    1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\BackupSkip.txt

    Filesize

    476KB

    MD5

    71254ac93cb8967bbbf9bb1b7c97e8f8

    SHA1

    06aef2ebebd8b52f8531d644efc2f92461dafc70

    SHA256

    c6ce8be7cc108b45629ff1f61a579e15ed97e7c1823cd06d91ce25559804d6f9

    SHA512

    f36bd271f035c529b6edc780e56857ca983cf9de6e209a6d6399b7d61311749a4a00f8d822855db5a99107bbaa4107ea1642ca85754e028cc3d22eee86784a72

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\BlockDebug.ocx

    Filesize

    359KB

    MD5

    faff5b493e4a9fe866ab080695f9cd9d

    SHA1

    3657a1a19f0ed0deaabcbd2b29cfef8be6e77bf5

    SHA256

    0385be8128837d332ca7db3a8c1c722bb1b7e9261399f396830ffbec74afaa16

    SHA512

    468c286687d8b3e65a68e623e34d1bf85f64790bef279d1373f73bf1d380936d33d9f8e0a149c75f99c1653cec3a5d191d2641ede07e0ec2d9e613107db73039

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\CheckpointConvert.vssx

    Filesize

    592KB

    MD5

    7cc50a39a6113805dc071a6826a2a1b5

    SHA1

    8af562de31dad2102157299544f7e89b79e0d162

    SHA256

    6db3f574a31fdf20a29eb8b12983b6aba2baffd963c3090f5e0df9b4e02dfc0f

    SHA512

    c3d8b985028ac6dbbc08d01dda5f75afe710a346e080c3dc4b3b8cff4e25afeed102f4598206935ebfeb8a6e3052b37f065ef7316ee4d0af6a6c9de69db30098

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\CompressSuspend.xlt

    Filesize

    406KB

    MD5

    f021615afa1e0d25921f8e8951fca18e

    SHA1

    cb7b2041944886fbf1632a068af8669ee34fc690

    SHA256

    0197c64198cdffa4887f449c8a2e3473795b9d1905e01dc864d583d01ae2f45b

    SHA512

    779530d3c5ef3a3e26143c1d7d058104f88a6689d4469466693f86bf2a77cf31804064190237778d5745d79c1524f7e18104fe3f7f8b2fa62f7cd1fd1dcadaaa

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\ExpandHide.pot

    Filesize

    429KB

    MD5

    5adcb9a18e812d1a8fd020eb4c568f28

    SHA1

    dba1e2f44dd7f65b91ad3ef98127770b63010815

    SHA256

    7a114dd37677350966e3a9cf54c931ed6419ed3fd31d163724f2508df4963495

    SHA512

    7f1c1a6dc630d9d47249baf4325c03a611ba074da2b695d461270913475c4912dc667932c33a7da82f2d9152704be5fccc057fe4ca64eb4d3e8d9644a8752d7a

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\FormatExpand.odt

    Filesize

    952KB

    MD5

    e8ec462debd20b445f145b4d880f2b53

    SHA1

    3f8f820525f305f33f451c60fbbcf09a9ebe1ec1

    SHA256

    682b20ab3ef9e8f22b9114b790baa6485251c6bf62577a2fd28ed007edc16653

    SHA512

    6eebd8f0c2f52580f4db0ebbb5b59f09d62e87673d1cfea23515bb18f80e543fba901e6f1215a26a62d21511afc18d6f21fb69db62fadce1d6a0b6e2a101743b

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\FormatSwitch.exe

    Filesize

    313KB

    MD5

    bdda53bcafe0aa66c184535f25280fc0

    SHA1

    43ca81611f6e3c259df2253519e3eb55523f8953

    SHA256

    b319cd0edfeedbe41aec28527bee47c6bd09df741b01981c059d4349449ef67f

    SHA512

    bcf50170157fa136dd204c704d3f28ca595a0fc82b99c173456338a8d910a6053ced76146f96d773b709cb32c3acd494ad538cc147528b39a473ba3efad74ce9

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\InstallCopy.docx

    Filesize

    545KB

    MD5

    045ca58030b27710456029c44073b72a

    SHA1

    4f10d6000713dd58568f48ab64b6f8206f04331d

    SHA256

    3f89a11bd648b801e8263da1b1ab2e64b9eec8348a20b0fd2a56b33138c7c16f

    SHA512

    1e54629b31246fa7c71c003476cc2c8109b03d2dd544c72e0dcef658cace129df4af3d8d0b0349283488dcf17fe8a5acc4820af1a81cf996fbd43e3a96d85799

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\OpenPublish.mp4

    Filesize

    522KB

    MD5

    2a0157dd3a44c125c0a268b651616854

    SHA1

    c1fc57db7a4688a0e768995c45dd13fbe0f3cf89

    SHA256

    0a6645765a5d89f4dd9fda3fb2e6baae7ff9a25e3b1b3522b2aa19c92b0f0681

    SHA512

    ad77366af2653e9b5fba1a2f9ea30de19bf8730d4f1ae939e41dd61a73ff535e1641fb6ea332ccb67d0bf33f4ba6261e6fa094c33ba08afc24c6a01e0fd2eb15

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\PublishUnlock.mp4v

    Filesize

    452KB

    MD5

    5c4474a7fb597d6023bc8a888fb107a6

    SHA1

    6e3282eb897fa54f22d792b7b863974f112fade9

    SHA256

    508e00d4e029b7ad2d24265a9143ee6efaca3bbdf0f2991575984bf185a0d785

    SHA512

    54f7c8ebf5ccd96fa37aae306278aa4d30df133feb54041330d1a342a7155d67270171d64fbb1f022eb281844b283c01f12b18fdfc2204254e93aaf8ddd86e1d

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\RemoveRename.wdp

    Filesize

    290KB

    MD5

    b90db4f6d1a4ee435cb1ea376aab45f2

    SHA1

    bdda7c2c505835715e23ce4488f255cff63fecf2

    SHA256

    662572a1e70e5f89f06015c047dcde03f3aef2d637d2af07ddb8eddc827cd990

    SHA512

    478fda29245c441556f3c270f0c175b82f6d38a972b1cc16b29e7dc5001b75417b11f8ea898ded4a164ca2cd280beb95086487812345e28f771a3bcdf7a8b2bd

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\RenameSplit.html

    Filesize

    243KB

    MD5

    35cd451a4d7797a15dc59b67fe6e754f

    SHA1

    1efcbabc95347000a492932f7d70cf8e44e6322b

    SHA256

    d948ce566d10fbaf3e2738dd1484001c6af4886ab5151b385b68dc6ded1f7d19

    SHA512

    407f5afb1e3afcfc4f121712f8a13a14ef82b06add76a514145d43d4851cdb995070142cd2c1b0bb7d8a7f8e368bcc6e753d71cc1a079a3b2b5bab2d2ac97795

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\RevokeLimit.tiff

    Filesize

    336KB

    MD5

    6dd9570b3891c7e471e4d554c44bf895

    SHA1

    9507e0c675048f5c76a69a47542ef62f02fca229

    SHA256

    51c8133f678cd823848bfaa9d255bcbdc2e6b509deb83597251eab3a060c1258

    SHA512

    3c9efa33e14c9fb2165a293fee629fd6c577eb5aef35284925de3b3f73c7ac2fcd7d5cfc84f44618e5490c99cd9972c41cbba3d33a930732e3cccca4d584ce81

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\SearchAdd.lock

    Filesize

    615KB

    MD5

    25254acb5e6f61d62cc839220cbcb2bd

    SHA1

    a19114a69f0896f003172de4baddb34ae900d4ce

    SHA256

    435371bf45e7fcdc694fd53b78ee6a48d0b80c917bee05f1ec340f1d924d66e6

    SHA512

    250d27e317d102d0b6cd96cd5c5dc1d24c4cd668cc3d5656991a2a90a202fe1c2c7e705952ddb3d9454eaca7850d2786dd90848ffa0011f4016715c839be1d85

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\SendUnblock.wmv

    Filesize

    638KB

    MD5

    243b70e6e5ba37c3afee7ee17823d3dd

    SHA1

    9880fb8c53cb25b5aed32a54155b545d4e556c92

    SHA256

    105aeb4a39d5e1bca6dd905edd14fe3d28086cb7005fda6f90d293bcfe28411f

    SHA512

    4555a15bf63af787ca81af940133d168c8934b602e859b999c8780ad337d30043c37f7832baf12255187728f2973436991e459c7a68037555ebe2db81ccb0aec

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\SplitDebug.dll

    Filesize

    267KB

    MD5

    0331a95814d66570e8c5d3d327c9298c

    SHA1

    803409a0ae664612dc0227045fb769f8af0c08da

    SHA256

    1d24886b5d31aacb748c82ee2dd63002b9914ca4ab6b91d9e59c3ac792c54c2a

    SHA512

    9fd1328d05f87aba58fe7537ee25a25afb8a37d6f52c6f3ae04d8b9cb91f8b8a0d3aec87050e47a4e4a47ab90b211a9e60b84b2131d95096cac565c7f8ee227a

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\SwitchFind.bmp

    Filesize

    499KB

    MD5

    6831656191bff4734e708331ca1be641

    SHA1

    121cb09cb552b7fd78d930ce74e80faca66adee4

    SHA256

    e5a3cb92164aac6de63e9c6567790b7255df6948c398d65932dd6cb6f4076c1f

    SHA512

    eeca9ce53a92b9d1e48c7448c4e4b1229f7ced874b610b03ac0ed8a4593cef2abeec5eb9b5a9c320c274154a3318b74fa402b931de9d909ed167194c59e1c034

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\UndoReset.pptm

    Filesize

    684KB

    MD5

    823094f447f758c2bc588cda26655533

    SHA1

    826640217aa7423281c769135a683e7ff933d7e3

    SHA256

    75d9d4ec8cc5addf1884bf7d668f8464b27d342a264d2ef80739bc578b30bba8

    SHA512

    7557a0478d5fa3dbfa4db4d31de803a5aff15ec5fe1e92932706a987c737110426821ee36ab1f15617f92033134dffa42e55c3b37e6503bc0b56b9138cc7024b

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\UnpublishRepair.aifc

    Filesize

    661KB

    MD5

    ce846ae72ae37568a4dc4e51a4a05dfe

    SHA1

    f9ec786105dedb6c46c741572e64ed43fcc1c24e

    SHA256

    2febe71cac29e60afbb953b0b898907ac28586085708a3cd288a9afbb9e8f192

    SHA512

    bb71b902cd338d92394669d20054a4934c5edf78d861190c1dac262b6f9e46024b71d84c0c1964e907df08a960614466550d8af65c466c4af04e16fa5bc1dcd7

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\UnregisterInstall.WTV

    Filesize

    568KB

    MD5

    38710423e57e429ba0772eafcab20afd

    SHA1

    63ed9d2dc938edd475c73fa609710d6fb3371955

    SHA256

    638ae46499f7287663f0563cddef859d8b0e7f04c5b9e1e5930f0f0f8288a545

    SHA512

    d97069d7c081f5880534c4d5aa5d9226b52090d314441046876a6ac8e2797f80b07288f25566c001eb0016024a0e2f59188e99e55ae5d55bdf26b24858549d19

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Files\UnregisterSelect.sys

    Filesize

    383KB

    MD5

    3679bba08b0aa9b50a59169ee0e0d526

    SHA1

    4eec25f1f08b2676e4b7de208c8754524999f2fc

    SHA256

    6c233322c5f9c0c4b103cd1d3e78959b9c8fe2b446b0aadb14c7695f56d4682a

    SHA512

    11cf73ff5262246308613b8e8c488f4d792fde4f22e32942e435640c08036c142f0bbb18b453914cda64481cbcf07b3d3cd174e937a3f4b84a217563f9fe0179

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Info.txt

    Filesize

    373B

    MD5

    45e2b9ce52af9cbe5e186a724833cf88

    SHA1

    bd8ecf552d6206c61f2f0d08f323426acc453fe2

    SHA256

    e0289fa194298de794be714ead4c402914be34452738ce91e471d41208adb764

    SHA512

    e3da7cc4c6cc78dce7728dc74f147c1836c1db792b78a296e28f7a97bada6fe8daf2d2ab3289eb8c8463fac9a9cc225b95f1b64390fb6b9553304368529dfb1f

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Processes.txt

    Filesize

    302B

    MD5

    ea44cf625dc23987dac6c904bcfb0a9b

    SHA1

    da5abecfcac2c2e93227a09663b72a057b49bf94

    SHA256

    099058803e6497a9473ef21896954a6282c4297f6e0899f1adab1d2f7673e9c8

    SHA512

    7b136fbd3c5ea78403947ecc1ab0ac72527533904bdfecd4351226a34c8eafc4d08dbd0143d8e92f574eb44b3ae0781ec62b83088fc5f481106e7dd9d716d689

  • C:\Users\Admin\AppData\Local\XLFwFXTuyTHVwyPFPN078BFBFF000306D2ECCD33FC33\18078BFBFF000306D2ECCD33FCwV\Programms.txt

    Filesize

    893B

    MD5

    4c0873f2172f682a32a885673460ad14

    SHA1

    122867f604535bc98a90bd9b12290863b66e79c3

    SHA256

    bd34455f68b6fe235a4bc2447b3f18fed09456063e85dfded9161c17735ce06d

    SHA512

    92fb9da4a34c9c95ba77b8f462c401f48008e2ccb59c1acfa01ade725e23c9b16259ac12d03394ed41232600df6b31d466b10f5f040fe73397dec8a724510495

  • memory/2024-6-0x000007FEF6060000-0x000007FEF6A4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2024-7-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/2024-0-0x0000000000870000-0x0000000000A04000-memory.dmp

    Filesize

    1.6MB

  • memory/2024-4-0x000000001BDD0000-0x000000001BEB6000-memory.dmp

    Filesize

    920KB

  • memory/2024-5-0x000000001B3A0000-0x000000001B416000-memory.dmp

    Filesize

    472KB

  • memory/2024-2-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/2024-1-0x000007FEF6060000-0x000007FEF6A4C000-memory.dmp

    Filesize

    9.9MB