Analysis

  • max time kernel
    115s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2023 16:26

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.24784.25099.exe

  • Size

    855KB

  • MD5

    90163fb614066a7abaa99b48bed01214

  • SHA1

    0495152453a74a29cc4effcf06e34f6b5e0c0d99

  • SHA256

    43ef89e27ca9e14fe36f2626444fd52557aa7a62c59ce2dc13e8ec4bec2a7b7b

  • SHA512

    8b2ffb990b123f87003127a9b8afb39c428d6dbad6093110455d1b4a8839b7338900e1c86908a443cbee3d8f3cf7aeed3a6b1e06c435838744a30c5d554f8dbe

  • SSDEEP

    12288:IBgOWP6i6+LhhQ0aRj1AYB5I9sT8eOQ0QpD3Ly6KZMWT8+ObVUG1ZiNZ0YapLlwn:ICgTlBPfOwI65WT8+Ob7X/HxClsfrY

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24784.25099.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24784.25099.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24784.25099.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24784.25099.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2020-8-0x0000000005DA0000-0x0000000005DA8000-memory.dmp

    Filesize

    32KB

  • memory/2020-6-0x0000000005C00000-0x0000000005C9C000-memory.dmp

    Filesize

    624KB

  • memory/2020-2-0x0000000005DC0000-0x0000000006364000-memory.dmp

    Filesize

    5.6MB

  • memory/2020-3-0x00000000058F0000-0x0000000005982000-memory.dmp

    Filesize

    584KB

  • memory/2020-0-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB

  • memory/2020-5-0x00000000058E0000-0x00000000058EA000-memory.dmp

    Filesize

    40KB

  • memory/2020-1-0x0000000000E50000-0x0000000000F2A000-memory.dmp

    Filesize

    872KB

  • memory/2020-7-0x0000000005BE0000-0x0000000005BF8000-memory.dmp

    Filesize

    96KB

  • memory/2020-4-0x0000000005B50000-0x0000000005B60000-memory.dmp

    Filesize

    64KB

  • memory/2020-9-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB

  • memory/2020-10-0x0000000006C70000-0x0000000006C7A000-memory.dmp

    Filesize

    40KB

  • memory/2020-11-0x000000000AAA0000-0x000000000AB5E000-memory.dmp

    Filesize

    760KB

  • memory/2020-17-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB

  • memory/4348-15-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/4348-12-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/4348-20-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB