Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2023 04:54
Behavioral task
behavioral1
Sample
3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe
Resource
win10v2004-20231130-en
General
-
Target
3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe
-
Size
1018KB
-
MD5
eb71493b8c138d52c8baea7adaae0a22
-
SHA1
2ada7d8d3975bae525945b18275f6e7779fbab79
-
SHA256
3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478
-
SHA512
d16b619badc3ebdf2961330bd4fdb6ccf63c16cbec3d8923f701aae82df66d935ff75ca74ecbae2edf6218f4363619bbb2be39a69f5072f589a2e6c16cea3b9c
-
SSDEEP
24576:b6dl6aVCGlaKNmzxXg6ipHKdyBnnjNd88L:uCa8GUKNmzxQGEd8I
Malware Config
Signatures
-
Detect PureLogs payload 1 IoCs
resource yara_rule behavioral1/memory/4660-0-0x0000000000A50000-0x0000000000B54000-memory.dmp family_purelogs -
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral1/memory/4856-14-0x0000000004F10000-0x0000000004FE4000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-18-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-16-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-20-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-22-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-24-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-26-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-28-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-32-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-30-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-34-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-36-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-38-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-42-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-40-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-44-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-46-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-48-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-50-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-52-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-54-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-56-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-58-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-60-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-64-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-62-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-66-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-68-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-74-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-72-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-70-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-78-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 behavioral1/memory/4856-76-0x0000000004F10000-0x0000000004FDE000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-423100829-2271632622-1028104103-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Danwks = "C:\\Users\\Admin\\AppData\\Roaming\\Danwks.exe" 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4660 set thread context of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe Token: SeDebugPrivilege 4856 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89 PID 4660 wrote to memory of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89 PID 4660 wrote to memory of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89 PID 4660 wrote to memory of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89 PID 4660 wrote to memory of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89 PID 4660 wrote to memory of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89 PID 4660 wrote to memory of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89 PID 4660 wrote to memory of 4856 4660 3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe"C:\Users\Admin\AppData\Local\Temp\3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exeC:\Users\Admin\AppData\Local\Temp\3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3a646773608d252c2b742a0f4f74c061d4d282a090c1d39c973cbfe386f3b478.exe.log
Filesize927B
MD54a911455784f74e368a4c2c7876d76f4
SHA1a1700a0849ffb4f26671eb76da2489946b821c34
SHA256264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c
SHA5124617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d