Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 12:59
Behavioral task
behavioral1
Sample
edd0efee31afa02a93fffde9a51640446f9de58ff13a456c4410bee9fc0fe3ca.exe
Resource
win7-20231020-en
5 signatures
150 seconds
General
-
Target
edd0efee31afa02a93fffde9a51640446f9de58ff13a456c4410bee9fc0fe3ca.exe
-
Size
4.7MB
-
MD5
7f6150d477d9eaf6f70436491a89dfe3
-
SHA1
06e90b4416529f7b572a64394ae191c33ba47ce6
-
SHA256
edd0efee31afa02a93fffde9a51640446f9de58ff13a456c4410bee9fc0fe3ca
-
SHA512
732c21e5da5ad89f5061c3c7abde6590e4521e82b3d84f7a46a3d5de2c1049892a315ae32425e5cc8f46698e58412ef4e84d48f07955621a2045c5e5791ba9dd
-
SSDEEP
98304:e+82Cvvk+b+2X7yzuF3PQ6Oy+shbZ24+0TilcsuNmLZcwoteB:V8VvvDR3PtvA4+0TeENwXoteB
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1396-0-0x0000000001320000-0x0000000001AC8000-memory.dmp family_zgrat_v1 -
resource yara_rule behavioral1/memory/1396-0-0x0000000001320000-0x0000000001AC8000-memory.dmp vmprotect -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1396 edd0efee31afa02a93fffde9a51640446f9de58ff13a456c4410bee9fc0fe3ca.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1396 edd0efee31afa02a93fffde9a51640446f9de58ff13a456c4410bee9fc0fe3ca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edd0efee31afa02a93fffde9a51640446f9de58ff13a456c4410bee9fc0fe3ca.exe"C:\Users\Admin\AppData\Local\Temp\edd0efee31afa02a93fffde9a51640446f9de58ff13a456c4410bee9fc0fe3ca.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1396