Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe
Resource
win10v2004-20231127-en
General
-
Target
SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe
-
Size
5KB
-
MD5
8b95800de56f2a64f7b7cd95e86dd589
-
SHA1
3a686e8fb346f6e7ad07b2fb10fea1faaed887bd
-
SHA256
d0f93d98529b19fc436ea00567f23e9e012d440669b8e728e17d8d8e20a147cd
-
SHA512
35d3e9b4a18e118e0879f09c6ce9cb17cdb7f8af37e8b55858f331755a5f8fee71939a2e25ba0e152f353d4f434ae8f82e91fcbf2f6af892af6739451724b099
-
SSDEEP
96:yLuDs+WNUUrytGdcsq+kdk4uo5tdf2zNt:yi3u+Ecmf4PPQ
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2172-3-0x000000001C6E0000-0x000000001C848000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-7-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-17-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-15-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-19-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-13-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-11-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-9-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-25-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-35-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-45-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-51-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-57-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-65-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-67-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-63-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-61-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-59-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-55-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-53-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-49-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-47-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-43-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-41-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-39-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-37-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-33-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-31-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-29-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-27-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-23-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-21-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-5-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-4-0x000000001C6E0000-0x000000001C841000-memory.dmp family_zgrat_v1 -
Loads dropped DLL 1 IoCs
pid Process 2280 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key opened \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key opened \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key opened \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key opened \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key opened \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key opened \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key opened \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key created \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows\CurrentVersion\Run\GC = "C:\\Users\\Admin\\AppData\\Roaming\\GC.exe" SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2172 set thread context of 2280 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 2280 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe Token: SeDebugPrivilege 2280 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2280 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 28 PID 2172 wrote to memory of 2280 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 28 PID 2172 wrote to memory of 2280 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 28 PID 2172 wrote to memory of 2280 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 28 PID 2172 wrote to memory of 2280 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 28 PID 2172 wrote to memory of 2280 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 28 PID 2172 wrote to memory of 2280 2172 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.TrojanX-gen.32623.1958.exe2⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5ad959160c024981e11e38f3d70102df1
SHA1342dabe112d8f7a11848a201d68104cfc12cd03e
SHA256c27f7569d4b7d221d3f18a8214b2f4eaee6c788180ef6d4651ddc672a4c0416a
SHA512583c20ad9dfa39f4803d6ee40959228ac38c7acdab57d6f6920e3cf786cc07ed31f287d9a7fb7c5a73f8d6caf0f36c8a0a91015d38ef6cdc3a5a30b7a92a8f41