Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 13:08
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
3.3MB
-
MD5
73bf50ef38ecadff4e120a31ad00c747
-
SHA1
295d4c63e6e06f332abc9bcd63fdc791a28106f3
-
SHA256
64cf760478ae702e8157d46821cfdb8fad6ac6bf640b511ca736d7315db70632
-
SHA512
bd3cd4b759984052a35e37fc5be326f7881eb5258a7e1e8eb73f19e4b6bb620189d81826df5575c7b2e54deaab77c1a0c96989e4e5171aeec5d6b4ef8108cb05
-
SSDEEP
49152:srtlvkg7SLN0vG1YThBRon856UwdeOJe+x0FkCJY7gmpYRt77M9oRSAS/t0IcZID:sr6VChQV+FYf
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1764-0-0x0000000000E70000-0x00000000011B8000-memory.dmp family_zgrat_v1 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1764 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1764 file.exe