Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 01:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
140510ca012bf95c60b339b6388c2ca9.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
General
-
Target
140510ca012bf95c60b339b6388c2ca9.exe
-
Size
812KB
-
MD5
140510ca012bf95c60b339b6388c2ca9
-
SHA1
97f4ef1024bd3c194572e8d3189f8fbf9d5cb127
-
SHA256
f00b2b25861c0218820c23eca788881bc73c8470f59872989acf60c04cd83630
-
SHA512
ee30c446d26f740d9b557f99cff04b3d471793b840b56ef769eee3011d6d2fda728a4864973ba4310e4a0d5793976b9f896c73b2d2317cdc7eec23810f4a0cf0
-
SSDEEP
12288:X8+/Pqc6JGU0QC6MFqRG1DOkzfAWSiXBZP6haDD5F33XUTmzFJNDVSAQ:s+/PqcFU7vMgqEOrP6haDlFHET0DMA
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2868-3-0x0000000004F00000-0x0000000004FBC000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-4-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-5-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-9-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-7-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-11-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-13-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-15-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-19-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-17-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-21-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-23-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-25-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-27-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-31-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-29-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-35-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-33-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-41-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-39-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-45-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-47-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-43-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-37-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-49-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-53-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-59-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-61-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-65-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-63-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-57-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-55-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-51-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 behavioral1/memory/2868-67-0x0000000004F00000-0x0000000004FB6000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2444 1096 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 140510ca012bf95c60b339b6388c2ca9.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 2868 wrote to memory of 1096 2868 140510ca012bf95c60b339b6388c2ca9.exe 28 PID 1096 wrote to memory of 2444 1096 RegAsm.exe 29 PID 1096 wrote to memory of 2444 1096 RegAsm.exe 29 PID 1096 wrote to memory of 2444 1096 RegAsm.exe 29 PID 1096 wrote to memory of 2444 1096 RegAsm.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\140510ca012bf95c60b339b6388c2ca9.exe"C:\Users\Admin\AppData\Local\Temp\140510ca012bf95c60b339b6388c2ca9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 2563⤵
- Program crash
PID:2444
-
-