Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 03:51
Behavioral task
behavioral1
Sample
5768eba6718c932e9caa87170c71edebe36888bc125a811ed59b7ec829f624f9.exe
Resource
win7-20231020-en
6 signatures
150 seconds
General
-
Target
5768eba6718c932e9caa87170c71edebe36888bc125a811ed59b7ec829f624f9.exe
-
Size
7.9MB
-
MD5
a46d082492eba45dff4253457a9de5ed
-
SHA1
45e9a8b5028fb7ccd1de374489456c6a2f984b21
-
SHA256
5768eba6718c932e9caa87170c71edebe36888bc125a811ed59b7ec829f624f9
-
SHA512
53cfe35b0968464eeae36c081bcf71aecd96caae809f7ffe27346aa97120186e0dd234a9bf0ed752ba1e2de907a285f1dd5a1f26f6d47d3e2297f66583c6c048
-
SSDEEP
196608:bW+hUvL/bLtFSDr3Asak/2RUADnoXZd64KxgBZb:bWcqHtFGrwUU1nxgBZ
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/2148-0-0x000001D98D120000-0x000001D98D90A000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/2148-0-0x000001D98D120000-0x000001D98D90A000-memory.dmp net_reactor -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 5768eba6718c932e9caa87170c71edebe36888bc125a811ed59b7ec829f624f9.exe 2148 5768eba6718c932e9caa87170c71edebe36888bc125a811ed59b7ec829f624f9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2148 5768eba6718c932e9caa87170c71edebe36888bc125a811ed59b7ec829f624f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5768eba6718c932e9caa87170c71edebe36888bc125a811ed59b7ec829f624f9.exe"C:\Users\Admin\AppData\Local\Temp\5768eba6718c932e9caa87170c71edebe36888bc125a811ed59b7ec829f624f9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148