Analysis

  • max time kernel
    136s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2023 17:25

General

  • Target

    NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe

  • Size

    5.5MB

  • MD5

    a61aac13f8a4841915791fb57aa2e275

  • SHA1

    c34330fb238e0b9ea1cca921e42fb46966e1d577

  • SHA256

    f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

  • SHA512

    9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

  • SSDEEP

    98304:YF85vlOC7s2wQPc8V94nWFQO0R6dheB4/ncnREmThJ45aTyFXBuirxD02g9rX:COvPgZeORpR67e4/ncRZTQXBFrWd

Malware Config

Signatures

  • Detect ZGRat V1 4 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Themida packer 23 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4920
      • C:\Users\Admin\AppData\Local\Temp\1000057001\mnr.exe
        "C:\Users\Admin\AppData\Local\Temp\1000057001\mnr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3848
      • C:\Users\Admin\AppData\Local\Temp\1000058001\clpch.exe
        "C:\Users\Admin\AppData\Local\Temp\1000058001\clpch.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4192
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s38g.0.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            5⤵
            • Delays execution with timeout.exe
            PID:2908
          • C:\ProgramData\pinterests\XRJNZC.exe
            "C:\ProgramData\pinterests\XRJNZC.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:692
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 632
              6⤵
              • Program crash
              PID:2452
  • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
    C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    PID:1124
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 692 -ip 692
    1⤵
      PID:3988
    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\pinterests\XRJNZC.exe

      Filesize

      5.6MB

      MD5

      a0e1fed1f09771f2bf3538fa41fac6ab

      SHA1

      204c2d8a1d9590db0a9e9c4e628bad8024527ed8

      SHA256

      dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44

      SHA512

      1a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159

    • C:\ProgramData\pinterests\XRJNZC.exe

      Filesize

      5.6MB

      MD5

      a0e1fed1f09771f2bf3538fa41fac6ab

      SHA1

      204c2d8a1d9590db0a9e9c4e628bad8024527ed8

      SHA256

      dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44

      SHA512

      1a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159

    • C:\Users\Admin\AppData\Local\Temp\1000057001\mnr.exe

      Filesize

      3.1MB

      MD5

      0a501e5abacadb4be16dfd88077b9a13

      SHA1

      23c81dd0e177be64b95b8815cf1ec492f2bb106e

      SHA256

      bc2431479cb69bab7792a354293de3a085507d8ab6a46f614a13cda5943e97f8

      SHA512

      8390b3754b48b00fe7b16583e1cf236d896594e4a26854ecf0e1fef402e86cd927afcfaf2120f699ecdcc3b5d8031c618723f43aed09fd5fa8575bdc907b6838

    • C:\Users\Admin\AppData\Local\Temp\1000057001\mnr.exe

      Filesize

      3.1MB

      MD5

      0a501e5abacadb4be16dfd88077b9a13

      SHA1

      23c81dd0e177be64b95b8815cf1ec492f2bb106e

      SHA256

      bc2431479cb69bab7792a354293de3a085507d8ab6a46f614a13cda5943e97f8

      SHA512

      8390b3754b48b00fe7b16583e1cf236d896594e4a26854ecf0e1fef402e86cd927afcfaf2120f699ecdcc3b5d8031c618723f43aed09fd5fa8575bdc907b6838

    • C:\Users\Admin\AppData\Local\Temp\1000057001\mnr.exe

      Filesize

      3.1MB

      MD5

      0a501e5abacadb4be16dfd88077b9a13

      SHA1

      23c81dd0e177be64b95b8815cf1ec492f2bb106e

      SHA256

      bc2431479cb69bab7792a354293de3a085507d8ab6a46f614a13cda5943e97f8

      SHA512

      8390b3754b48b00fe7b16583e1cf236d896594e4a26854ecf0e1fef402e86cd927afcfaf2120f699ecdcc3b5d8031c618723f43aed09fd5fa8575bdc907b6838

    • C:\Users\Admin\AppData\Local\Temp\1000058001\clpch.exe

      Filesize

      5.6MB

      MD5

      a0e1fed1f09771f2bf3538fa41fac6ab

      SHA1

      204c2d8a1d9590db0a9e9c4e628bad8024527ed8

      SHA256

      dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44

      SHA512

      1a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159

    • C:\Users\Admin\AppData\Local\Temp\1000058001\clpch.exe

      Filesize

      5.6MB

      MD5

      a0e1fed1f09771f2bf3538fa41fac6ab

      SHA1

      204c2d8a1d9590db0a9e9c4e628bad8024527ed8

      SHA256

      dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44

      SHA512

      1a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159

    • C:\Users\Admin\AppData\Local\Temp\1000058001\clpch.exe

      Filesize

      5.6MB

      MD5

      a0e1fed1f09771f2bf3538fa41fac6ab

      SHA1

      204c2d8a1d9590db0a9e9c4e628bad8024527ed8

      SHA256

      dd419c5bf49b28b78b0c45ab00411bae560a264001138395bd5e41601efdcd44

      SHA512

      1a62bfeb959f9a8aa737ee923d43d1be425bf4434ab898a2fced7d50f763a15a950be8d3cd732b8366a413ece9fdfb2e7a4565e7fb83d7cb212b7f366b89b159

    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

      Filesize

      5.5MB

      MD5

      a61aac13f8a4841915791fb57aa2e275

      SHA1

      c34330fb238e0b9ea1cca921e42fb46966e1d577

      SHA256

      f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

      SHA512

      9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

      Filesize

      5.5MB

      MD5

      a61aac13f8a4841915791fb57aa2e275

      SHA1

      c34330fb238e0b9ea1cca921e42fb46966e1d577

      SHA256

      f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

      SHA512

      9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

      Filesize

      5.5MB

      MD5

      a61aac13f8a4841915791fb57aa2e275

      SHA1

      c34330fb238e0b9ea1cca921e42fb46966e1d577

      SHA256

      f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

      SHA512

      9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

      Filesize

      5.5MB

      MD5

      a61aac13f8a4841915791fb57aa2e275

      SHA1

      c34330fb238e0b9ea1cca921e42fb46966e1d577

      SHA256

      f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

      SHA512

      9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

    • C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe

      Filesize

      5.5MB

      MD5

      a61aac13f8a4841915791fb57aa2e275

      SHA1

      c34330fb238e0b9ea1cca921e42fb46966e1d577

      SHA256

      f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb

      SHA512

      9ee58ab3d775796cf73a2ce29ec9adbd3f72f789a5076a7d434d22f288ee012814af059738d6b9f23535ac9dad672ab255c88212bab7e9e7c72ee9be80cb7b7f

    • C:\Users\Admin\AppData\Local\Temp\s38g.0.bat

      Filesize

      176B

      MD5

      00db5eb8b243bd2bdac10b0132c509e6

      SHA1

      4775c812ea01746a7a6adb2b1e0746c3eee503f5

      SHA256

      2e2bf32281a19dfba48e7d2ffcd2e70476a346f244b37bdf1d1d4debb91d1c94

      SHA512

      7a28637eb7b014f052a67a05faea530b00540b1f1ffe7718d945286c85974664a9eb8953c314b91f1d7e5712242b0f6ce71cce940bf746d444771d19c4aa0076

    • memory/692-130-0x0000000000950000-0x0000000000951000-memory.dmp

      Filesize

      4KB

    • memory/692-134-0x00000000009C0000-0x00000000009C1000-memory.dmp

      Filesize

      4KB

    • memory/692-133-0x00000000009B0000-0x00000000009B1000-memory.dmp

      Filesize

      4KB

    • memory/692-131-0x0000000000960000-0x0000000000961000-memory.dmp

      Filesize

      4KB

    • memory/692-135-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/692-129-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/692-136-0x00000000009D0000-0x00000000009D1000-memory.dmp

      Filesize

      4KB

    • memory/692-145-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/692-141-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/692-142-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/692-143-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/692-144-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/692-147-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/692-132-0x0000000000990000-0x0000000000991000-memory.dmp

      Filesize

      4KB

    • memory/692-146-0x00000000009E0000-0x0000000001846000-memory.dmp

      Filesize

      14.4MB

    • memory/1124-49-0x0000000001880000-0x0000000001881000-memory.dmp

      Filesize

      4KB

    • memory/1124-52-0x00000000018D0000-0x00000000018D1000-memory.dmp

      Filesize

      4KB

    • memory/1124-53-0x00000000018F0000-0x00000000018F1000-memory.dmp

      Filesize

      4KB

    • memory/1124-54-0x0000000001900000-0x0000000001901000-memory.dmp

      Filesize

      4KB

    • memory/1124-55-0x0000000001910000-0x0000000001911000-memory.dmp

      Filesize

      4KB

    • memory/1124-56-0x0000000000AF0000-0x00000000014FC000-memory.dmp

      Filesize

      10.0MB

    • memory/1124-51-0x00000000018A0000-0x00000000018A1000-memory.dmp

      Filesize

      4KB

    • memory/1124-70-0x0000000000AF0000-0x00000000014FC000-memory.dmp

      Filesize

      10.0MB

    • memory/1124-50-0x0000000001890000-0x0000000001891000-memory.dmp

      Filesize

      4KB

    • memory/1124-48-0x0000000000AF0000-0x00000000014FC000-memory.dmp

      Filesize

      10.0MB

    • memory/2680-33-0x0000000001970000-0x0000000001971000-memory.dmp

      Filesize

      4KB

    • memory/2680-27-0x0000000000AF0000-0x00000000014FC000-memory.dmp

      Filesize

      10.0MB

    • memory/2680-34-0x0000000001980000-0x0000000001981000-memory.dmp

      Filesize

      4KB

    • memory/2680-32-0x0000000000AF0000-0x00000000014FC000-memory.dmp

      Filesize

      10.0MB

    • memory/2680-31-0x0000000001960000-0x0000000001961000-memory.dmp

      Filesize

      4KB

    • memory/2680-30-0x00000000015F0000-0x00000000015F1000-memory.dmp

      Filesize

      4KB

    • memory/2680-40-0x0000000000AF0000-0x00000000014FC000-memory.dmp

      Filesize

      10.0MB

    • memory/2680-35-0x0000000001990000-0x0000000001991000-memory.dmp

      Filesize

      4KB

    • memory/2680-29-0x00000000015D0000-0x00000000015D1000-memory.dmp

      Filesize

      4KB

    • memory/2680-28-0x00000000015C0000-0x00000000015C1000-memory.dmp

      Filesize

      4KB

    • memory/3044-150-0x0000000000770000-0x0000000000771000-memory.dmp

      Filesize

      4KB

    • memory/3044-149-0x0000000000AF0000-0x00000000014FC000-memory.dmp

      Filesize

      10.0MB

    • memory/3044-160-0x0000000000AF0000-0x00000000014FC000-memory.dmp

      Filesize

      10.0MB

    • memory/3848-77-0x00007FFFA90E0000-0x00007FFFA9BA1000-memory.dmp

      Filesize

      10.8MB

    • memory/3848-76-0x00000000005A0000-0x00000000008BA000-memory.dmp

      Filesize

      3.1MB

    • memory/3848-81-0x00007FFFA90E0000-0x00007FFFA9BA1000-memory.dmp

      Filesize

      10.8MB

    • memory/3848-78-0x0000000003360000-0x0000000003370000-memory.dmp

      Filesize

      64KB

    • memory/3848-79-0x0000000003210000-0x0000000003211000-memory.dmp

      Filesize

      4KB

    • memory/4192-124-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-115-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-116-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-117-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-118-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-114-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-113-0x0000000077704000-0x0000000077706000-memory.dmp

      Filesize

      8KB

    • memory/4192-104-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/4192-109-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-108-0x0000000003AE0000-0x0000000003AE1000-memory.dmp

      Filesize

      4KB

    • memory/4192-105-0x0000000003AC0000-0x0000000003AC1000-memory.dmp

      Filesize

      4KB

    • memory/4192-107-0x0000000003AD0000-0x0000000003AD1000-memory.dmp

      Filesize

      4KB

    • memory/4192-106-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-103-0x0000000001FD0000-0x0000000001FD1000-memory.dmp

      Filesize

      4KB

    • memory/4192-101-0x0000000000D00000-0x0000000001B66000-memory.dmp

      Filesize

      14.4MB

    • memory/4192-102-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

      Filesize

      4KB

    • memory/4816-0-0x0000000000A80000-0x000000000148C000-memory.dmp

      Filesize

      10.0MB

    • memory/4816-8-0x0000000000A80000-0x000000000148C000-memory.dmp

      Filesize

      10.0MB

    • memory/4816-7-0x0000000003770000-0x0000000003771000-memory.dmp

      Filesize

      4KB

    • memory/4816-6-0x0000000003750000-0x0000000003751000-memory.dmp

      Filesize

      4KB

    • memory/4816-5-0x0000000003740000-0x0000000003741000-memory.dmp

      Filesize

      4KB

    • memory/4816-4-0x0000000003730000-0x0000000003731000-memory.dmp

      Filesize

      4KB

    • memory/4816-2-0x0000000001970000-0x0000000001971000-memory.dmp

      Filesize

      4KB

    • memory/4816-3-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/4816-1-0x0000000001960000-0x0000000001961000-memory.dmp

      Filesize

      4KB

    • memory/4816-14-0x0000000000A80000-0x000000000148C000-memory.dmp

      Filesize

      10.0MB

    • memory/4816-22-0x0000000000A80000-0x000000000148C000-memory.dmp

      Filesize

      10.0MB

    • memory/4816-26-0x0000000000A80000-0x000000000148C000-memory.dmp

      Filesize

      10.0MB