Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24/11/2023, 13:36
Behavioral task
behavioral1
Sample
88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe
Resource
win7-20231023-en
General
-
Target
88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe
-
Size
20.4MB
-
MD5
88cc26f5d63af5fcfdc36accae0db04f
-
SHA1
46d7627f0a00cd378684555e30d7bfbe78687143
-
SHA256
ee2f4598d9f48283bdd46bb0c9bd70f250a257e89bcfc2fc03275b913230d358
-
SHA512
3cd33e09524223a1baf882671eacb8033b354a03993c2d2ed7a4ba04796f9b518b5d5b92c93210492f0228bbbb057538bbf23507d10fd8112dce38b359f92cb5
-
SSDEEP
393216:WDfxovk0AJIh+vncZ9YvMQRVbjUU+5+NBoTRdDzWjWl2xEIYYOoq:WVovkNJIh+vXMwVb3+5+Xo1dva9FYYFq
Malware Config
Signatures
-
Detect ZGRat V1 11 IoCs
resource yara_rule behavioral1/files/0x00070000000120ca-2.dat family_zgrat_v1 behavioral1/files/0x00070000000120ca-5.dat family_zgrat_v1 behavioral1/files/0x00070000000120ca-6.dat family_zgrat_v1 behavioral1/memory/2124-7-0x0000000000400000-0x0000000001865000-memory.dmp family_zgrat_v1 behavioral1/files/0x00340000000142c1-17.dat family_zgrat_v1 behavioral1/files/0x00340000000142c1-20.dat family_zgrat_v1 behavioral1/files/0x00340000000142c1-19.dat family_zgrat_v1 behavioral1/files/0x00340000000142c1-18.dat family_zgrat_v1 behavioral1/memory/1740-21-0x00000000012C0000-0x0000000001648000-memory.dmp family_zgrat_v1 behavioral1/files/0x000600000001560d-105.dat family_zgrat_v1 behavioral1/files/0x00340000000142c1-117.dat family_zgrat_v1 -
Executes dropped EXE 3 IoCs
pid Process 2844 Nursultan.exe 1740 HyperDriverIntocrtDll.exe 2504 HyperDriverIntocrtDll.exe -
Loads dropped DLL 3 IoCs
pid Process 2124 88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe 2588 cmd.exe 2588 cmd.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\en-US\csrss.exe HyperDriverIntocrtDll.exe File created C:\Program Files\Windows Mail\en-US\services.exe HyperDriverIntocrtDll.exe File created C:\Program Files\Windows Mail\en-US\c5b4cb5e9653cc HyperDriverIntocrtDll.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\lsm.exe HyperDriverIntocrtDll.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\101b941d020240 HyperDriverIntocrtDll.exe File created C:\Program Files\Common Files\Services\lsass.exe HyperDriverIntocrtDll.exe File created C:\Program Files\Common Files\Services\6203df4a6bafc7 HyperDriverIntocrtDll.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\csrss.exe HyperDriverIntocrtDll.exe File created C:\Program Files (x86)\Windows Defender\en-US\886983d96e3d3e HyperDriverIntocrtDll.exe File created C:\Program Files\Windows Journal\es-ES\csrss.exe HyperDriverIntocrtDll.exe File created C:\Program Files\Windows Journal\es-ES\886983d96e3d3e HyperDriverIntocrtDll.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\rc0001\sppsvc.exe HyperDriverIntocrtDll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1092 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe 1740 HyperDriverIntocrtDll.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2504 HyperDriverIntocrtDll.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1740 HyperDriverIntocrtDll.exe Token: SeDebugPrivilege 2504 HyperDriverIntocrtDll.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2844 2124 88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe 28 PID 2124 wrote to memory of 2844 2124 88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe 28 PID 2124 wrote to memory of 2844 2124 88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe 28 PID 2124 wrote to memory of 2844 2124 88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe 28 PID 2844 wrote to memory of 1992 2844 Nursultan.exe 29 PID 2844 wrote to memory of 1992 2844 Nursultan.exe 29 PID 2844 wrote to memory of 1992 2844 Nursultan.exe 29 PID 2844 wrote to memory of 1992 2844 Nursultan.exe 29 PID 1992 wrote to memory of 2588 1992 WScript.exe 30 PID 1992 wrote to memory of 2588 1992 WScript.exe 30 PID 1992 wrote to memory of 2588 1992 WScript.exe 30 PID 1992 wrote to memory of 2588 1992 WScript.exe 30 PID 2588 wrote to memory of 1740 2588 cmd.exe 32 PID 2588 wrote to memory of 1740 2588 cmd.exe 32 PID 2588 wrote to memory of 1740 2588 cmd.exe 32 PID 2588 wrote to memory of 1740 2588 cmd.exe 32 PID 1740 wrote to memory of 2340 1740 HyperDriverIntocrtDll.exe 33 PID 1740 wrote to memory of 2340 1740 HyperDriverIntocrtDll.exe 33 PID 1740 wrote to memory of 2340 1740 HyperDriverIntocrtDll.exe 33 PID 2340 wrote to memory of 1960 2340 cmd.exe 35 PID 2340 wrote to memory of 1960 2340 cmd.exe 35 PID 2340 wrote to memory of 1960 2340 cmd.exe 35 PID 2340 wrote to memory of 1092 2340 cmd.exe 36 PID 2340 wrote to memory of 1092 2340 cmd.exe 36 PID 2340 wrote to memory of 1092 2340 cmd.exe 36 PID 2340 wrote to memory of 2504 2340 cmd.exe 39 PID 2340 wrote to memory of 2504 2340 cmd.exe 39 PID 2340 wrote to memory of 2504 2340 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe"C:\Users\Admin\AppData\Local\Temp\88CC26F5D63AF5FCFDC36ACCAE0DB04F.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComponentSavesmonitordll\4R9Rg51iS3uwufB6AmlFTJfH4UnV5i8D9fFIGn1EV7sKuTgZgKEMxEZz4Pb.vbe"3⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ComponentSavesmonitordll\UEE5DygFrJCmvXGMhlwQJ.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\ComponentSavesmonitordll\HyperDriverIntocrtDll.exe"C:\ComponentSavesmonitordll/HyperDriverIntocrtDll.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\B8W2aAH07C.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:1960
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
PID:1092
-
-
C:\ComponentSavesmonitordll\HyperDriverIntocrtDll.exe"C:\ComponentSavesmonitordll\HyperDriverIntocrtDll.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD5f8a786f4c014917d7813e05e5a8dcdf0
SHA1e136d8e4d9ac5223810dab7b51937266647ca104
SHA256f90b392e0e4fec9e3a7993d75aca2919e04d294347957452f1196a04a738bdb7
SHA5122cb0be5d04d002aabcddd3d9794f13b264ea852e0c800e3ddc5f9992552cc5b2c718d0d34023ae1285df2e65801f4cc7adc005a41d9ca03f114ffc7a2a1056ab
-
Filesize
3.5MB
MD50f9b1f324db2774c14c2257eeed247fe
SHA152dcd3675150cf90e2ebc27bf745f700f747b758
SHA256d89ca804c1df9ae20c5ca623469b736e10f8bc649ffc4de9fa7929448d04fc08
SHA5127563c259bef09530c3b7c57ff885ddfba1a4aa05a33e54abd789b75aed25afa1fa5c7c22e99da21806dc8a09797dd106f80306ae665c81d8e21e7bbb3b651187
-
Filesize
3.5MB
MD50f9b1f324db2774c14c2257eeed247fe
SHA152dcd3675150cf90e2ebc27bf745f700f747b758
SHA256d89ca804c1df9ae20c5ca623469b736e10f8bc649ffc4de9fa7929448d04fc08
SHA5127563c259bef09530c3b7c57ff885ddfba1a4aa05a33e54abd789b75aed25afa1fa5c7c22e99da21806dc8a09797dd106f80306ae665c81d8e21e7bbb3b651187
-
Filesize
3.5MB
MD50f9b1f324db2774c14c2257eeed247fe
SHA152dcd3675150cf90e2ebc27bf745f700f747b758
SHA256d89ca804c1df9ae20c5ca623469b736e10f8bc649ffc4de9fa7929448d04fc08
SHA5127563c259bef09530c3b7c57ff885ddfba1a4aa05a33e54abd789b75aed25afa1fa5c7c22e99da21806dc8a09797dd106f80306ae665c81d8e21e7bbb3b651187
-
Filesize
101B
MD58ac9a3a332f136cefbe9c27eab65a4c7
SHA18aef4996baf542b09f11692cc91c3aa9a6d85bbe
SHA2563a9ed449a604fded1dbbef4ff997dc7ed5d9366c262eaf6c687d2c0dffbaa1b3
SHA5124928cb40bc3ebdcbf4b1d155d6581eaafdd2f37c2029bb8a7c35302ba6da6bbd414d3d7ec43b7b120874dcd7c0e168573c055be111663626998960a335d7afe7
-
Filesize
3.5MB
MD50f9b1f324db2774c14c2257eeed247fe
SHA152dcd3675150cf90e2ebc27bf745f700f747b758
SHA256d89ca804c1df9ae20c5ca623469b736e10f8bc649ffc4de9fa7929448d04fc08
SHA5127563c259bef09530c3b7c57ff885ddfba1a4aa05a33e54abd789b75aed25afa1fa5c7c22e99da21806dc8a09797dd106f80306ae665c81d8e21e7bbb3b651187
-
Filesize
181B
MD55f535ee0f14cdd399a3521d798127449
SHA1d539e58601ba42dc3f7dab1a79d895f4f701886a
SHA256dfe4a90f25879a9498582ed2ed44d13828cf44c581b46412fd9b9b7e804bbf7e
SHA512a76ab31a2dbe7ff2ca7c023930a2239f58d688bc7bad424aea891fe697ee22666d2e3cc35bd85e7fb7e34a71f8712095e8662b2248ddaf1bd128643579bfca2f
-
Filesize
4.0MB
MD510ac3ea14e236503bc422f963d20d510
SHA1bdde4479f4fd0c87e918a71a42138aa2811e6f1a
SHA256339078555e679d49401fbd5cd170a5418f8d7899d0d2fe277b456062f11aa4d2
SHA51281831fec1e2fdbe1abd27d378a6db11725e97b52051b11c200c80f4dd8bdea8ff797e7eac32e1356f2f0912bb585e3b36c000959fa9a26cb0f8c5ea702a4f6f2
-
Filesize
4.0MB
MD510ac3ea14e236503bc422f963d20d510
SHA1bdde4479f4fd0c87e918a71a42138aa2811e6f1a
SHA256339078555e679d49401fbd5cd170a5418f8d7899d0d2fe277b456062f11aa4d2
SHA51281831fec1e2fdbe1abd27d378a6db11725e97b52051b11c200c80f4dd8bdea8ff797e7eac32e1356f2f0912bb585e3b36c000959fa9a26cb0f8c5ea702a4f6f2
-
Filesize
3.5MB
MD50f9b1f324db2774c14c2257eeed247fe
SHA152dcd3675150cf90e2ebc27bf745f700f747b758
SHA256d89ca804c1df9ae20c5ca623469b736e10f8bc649ffc4de9fa7929448d04fc08
SHA5127563c259bef09530c3b7c57ff885ddfba1a4aa05a33e54abd789b75aed25afa1fa5c7c22e99da21806dc8a09797dd106f80306ae665c81d8e21e7bbb3b651187
-
Filesize
3.5MB
MD50f9b1f324db2774c14c2257eeed247fe
SHA152dcd3675150cf90e2ebc27bf745f700f747b758
SHA256d89ca804c1df9ae20c5ca623469b736e10f8bc649ffc4de9fa7929448d04fc08
SHA5127563c259bef09530c3b7c57ff885ddfba1a4aa05a33e54abd789b75aed25afa1fa5c7c22e99da21806dc8a09797dd106f80306ae665c81d8e21e7bbb3b651187
-
Filesize
4.0MB
MD510ac3ea14e236503bc422f963d20d510
SHA1bdde4479f4fd0c87e918a71a42138aa2811e6f1a
SHA256339078555e679d49401fbd5cd170a5418f8d7899d0d2fe277b456062f11aa4d2
SHA51281831fec1e2fdbe1abd27d378a6db11725e97b52051b11c200c80f4dd8bdea8ff797e7eac32e1356f2f0912bb585e3b36c000959fa9a26cb0f8c5ea702a4f6f2