Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
11-12-2023 13:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
r1210DEC-GIG.exe
Resource
win7-20231020-en
windows7-x64
6 signatures
150 seconds
General
-
Target
r1210DEC-GIG.exe
-
Size
627KB
-
MD5
35092b310e4d2832d81b8f5d9ef1e094
-
SHA1
ec3a6137aedb5c7b056d51ce653f10c094a4ef14
-
SHA256
ed4ef6ea5bca41f50f9300b0c0527ff04a1bb54150202d6e357a92433bda46cf
-
SHA512
8739c9deac4df2c9b20e9f9207f600bfb83c364f3c1bcdd098e878a2ba3969de2c348c5084a3d772b03683dce4d240510822db280c2565735ecc4368328ec725
-
SSDEEP
12288:ApEmQepZshyxfbCErYeNWDUuZv7IgKM7Uvj5Z+62Tp1Lnly4hdw:ApE0bCcWDUynKM7H31Xy/
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1096-3-0x00000000005E0000-0x00000000005F8000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1096 set thread context of 2800 1096 r1210DEC-GIG.exe 28 PID 2800 set thread context of 1364 2800 r1210DEC-GIG.exe 22 PID 2800 set thread context of 1468 2800 r1210DEC-GIG.exe 31 PID 1468 set thread context of 1364 1468 netiougc.exe 22 -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2800 r1210DEC-GIG.exe 2800 r1210DEC-GIG.exe 2800 r1210DEC-GIG.exe 2800 r1210DEC-GIG.exe 2800 r1210DEC-GIG.exe 2800 r1210DEC-GIG.exe 2800 r1210DEC-GIG.exe 2800 r1210DEC-GIG.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe 1468 netiougc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2800 r1210DEC-GIG.exe 1364 Explorer.EXE 1364 Explorer.EXE 1468 netiougc.exe 1468 netiougc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2800 1096 r1210DEC-GIG.exe 28 PID 1096 wrote to memory of 2800 1096 r1210DEC-GIG.exe 28 PID 1096 wrote to memory of 2800 1096 r1210DEC-GIG.exe 28 PID 1096 wrote to memory of 2800 1096 r1210DEC-GIG.exe 28 PID 1096 wrote to memory of 2800 1096 r1210DEC-GIG.exe 28 PID 1096 wrote to memory of 2800 1096 r1210DEC-GIG.exe 28 PID 1096 wrote to memory of 2800 1096 r1210DEC-GIG.exe 28 PID 1364 wrote to memory of 1468 1364 Explorer.EXE 31 PID 1364 wrote to memory of 1468 1364 Explorer.EXE 31 PID 1364 wrote to memory of 1468 1364 Explorer.EXE 31 PID 1364 wrote to memory of 1468 1364 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\r1210DEC-GIG.exe"C:\Users\Admin\AppData\Local\Temp\r1210DEC-GIG.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\r1210DEC-GIG.exe"C:\Users\Admin\AppData\Local\Temp\r1210DEC-GIG.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2800
-
-
-
C:\Windows\SysWOW64\netiougc.exe"C:\Windows\SysWOW64\netiougc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1468
-