Analysis

  • max time kernel
    299s
  • max time network
    304s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-12-2023 22:20

General

  • Target

    2afe84f8866168611d41b5eec0345f3e3459f611a77859f71f9be7e0f635736d.exe

  • Size

    4.7MB

  • MD5

    37f406c2985041ad85f1f3d6db1249ff

  • SHA1

    56f4ed0bcba0bf7fe60c27d1ddf260f32b9e29c3

  • SHA256

    2afe84f8866168611d41b5eec0345f3e3459f611a77859f71f9be7e0f635736d

  • SHA512

    f3415cb83d10ef62aca5986dd668b1109162651eaf509a06ee42bc1f3fb63c2ff5d8ab7ceeac9c098f3b5f121c8d278a0d97f3341e13f0f55bf564aaed1f5b6b

  • SSDEEP

    98304:xrfhS3srwSUx+DMn+8vYDhRgUqmF14UZr:xrfhS3EDg+lZt9Z

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • Detects Arechclient2 RAT 1 IoCs

    Arechclient2.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2afe84f8866168611d41b5eec0345f3e3459f611a77859f71f9be7e0f635736d.exe
    "C:\Users\Admin\AppData\Local\Temp\2afe84f8866168611d41b5eec0345f3e3459f611a77859f71f9be7e0f635736d.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
        PID:4476
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        2⤵
          PID:4996
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          2⤵
            PID:1048
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            2⤵
              PID:4980
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 1568
              2⤵
              • Program crash
              PID:2256

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpDBFA.tmp

            Filesize

            20KB

            MD5

            c9ff7748d8fcef4cf84a5501e996a641

            SHA1

            02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

            SHA256

            4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

            SHA512

            d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

          • \Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

            Filesize

            742KB

            MD5

            544cd51a596619b78e9b54b70088307d

            SHA1

            4769ddd2dbc1dc44b758964ed0bd231b85880b65

            SHA256

            dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

            SHA512

            f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

          • memory/2448-31-0x0000000005820000-0x0000000005870000-memory.dmp

            Filesize

            320KB

          • memory/2448-25-0x0000000000400000-0x00000000004D2000-memory.dmp

            Filesize

            840KB

          • memory/2448-55-0x0000000073B30000-0x000000007421E000-memory.dmp

            Filesize

            6.9MB

          • memory/2448-32-0x0000000005920000-0x0000000005986000-memory.dmp

            Filesize

            408KB

          • memory/2448-30-0x0000000005780000-0x000000000579E000-memory.dmp

            Filesize

            120KB

          • memory/2448-29-0x0000000006460000-0x000000000698C000-memory.dmp

            Filesize

            5.2MB

          • memory/2448-28-0x0000000005190000-0x0000000005206000-memory.dmp

            Filesize

            472KB

          • memory/2448-27-0x0000000005360000-0x0000000005522000-memory.dmp

            Filesize

            1.8MB

          • memory/2448-26-0x0000000073B30000-0x000000007421E000-memory.dmp

            Filesize

            6.9MB

          • memory/4400-5-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-8-0x00000000076F0000-0x0000000007882000-memory.dmp

            Filesize

            1.6MB

          • memory/4400-17-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-19-0x0000000007E70000-0x0000000007F70000-memory.dmp

            Filesize

            1024KB

          • memory/4400-18-0x0000000073B30000-0x000000007421E000-memory.dmp

            Filesize

            6.9MB

          • memory/4400-20-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-21-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-54-0x0000000007E70000-0x0000000007F70000-memory.dmp

            Filesize

            1024KB

          • memory/4400-3-0x00000000057F0000-0x0000000005882000-memory.dmp

            Filesize

            584KB

          • memory/4400-7-0x0000000007450000-0x00000000076EC000-memory.dmp

            Filesize

            2.6MB

          • memory/4400-14-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-15-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-2-0x0000000005C20000-0x000000000611E000-memory.dmp

            Filesize

            5.0MB

          • memory/4400-16-0x00000000061D0000-0x00000000061E0000-memory.dmp

            Filesize

            64KB

          • memory/4400-22-0x0000000007E70000-0x0000000007F70000-memory.dmp

            Filesize

            1024KB

          • memory/4400-6-0x00000000059B0000-0x00000000059BA000-memory.dmp

            Filesize

            40KB

          • memory/4400-0-0x0000000073B30000-0x000000007421E000-memory.dmp

            Filesize

            6.9MB

          • memory/4400-24-0x0000000007E70000-0x0000000007F70000-memory.dmp

            Filesize

            1024KB

          • memory/4400-1-0x0000000000AD0000-0x0000000000F90000-memory.dmp

            Filesize

            4.8MB

          • memory/4400-42-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-43-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-51-0x0000000007E70000-0x0000000007F70000-memory.dmp

            Filesize

            1024KB

          • memory/4400-52-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-53-0x0000000007E70000-0x0000000007F70000-memory.dmp

            Filesize

            1024KB

          • memory/4400-23-0x0000000005B30000-0x0000000005B40000-memory.dmp

            Filesize

            64KB

          • memory/4400-4-0x0000000005A30000-0x0000000005ACC000-memory.dmp

            Filesize

            624KB