Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 13:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
r1210DEC-GIG.exe
Resource
win7-20231020-en
windows7-x64
6 signatures
150 seconds
General
-
Target
r1210DEC-GIG.exe
-
Size
627KB
-
MD5
35092b310e4d2832d81b8f5d9ef1e094
-
SHA1
ec3a6137aedb5c7b056d51ce653f10c094a4ef14
-
SHA256
ed4ef6ea5bca41f50f9300b0c0527ff04a1bb54150202d6e357a92433bda46cf
-
SHA512
8739c9deac4df2c9b20e9f9207f600bfb83c364f3c1bcdd098e878a2ba3969de2c348c5084a3d772b03683dce4d240510822db280c2565735ecc4368328ec725
-
SSDEEP
12288:ApEmQepZshyxfbCErYeNWDUuZv7IgKM7Uvj5Z+62Tp1Lnly4hdw:ApE0bCcWDUynKM7H31Xy/
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/1724-7-0x00000000053E0000-0x00000000053F8000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1724 set thread context of 1796 1724 r1210DEC-GIG.exe 90 PID 1796 set thread context of 3268 1796 r1210DEC-GIG.exe 56 PID 1796 set thread context of 400 1796 r1210DEC-GIG.exe 98 PID 400 set thread context of 3268 400 netiougc.exe 56 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 1796 r1210DEC-GIG.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe 400 netiougc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1796 r1210DEC-GIG.exe 3268 Explorer.EXE 3268 Explorer.EXE 400 netiougc.exe 400 netiougc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3268 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1796 1724 r1210DEC-GIG.exe 90 PID 1724 wrote to memory of 1796 1724 r1210DEC-GIG.exe 90 PID 1724 wrote to memory of 1796 1724 r1210DEC-GIG.exe 90 PID 1724 wrote to memory of 1796 1724 r1210DEC-GIG.exe 90 PID 1724 wrote to memory of 1796 1724 r1210DEC-GIG.exe 90 PID 1724 wrote to memory of 1796 1724 r1210DEC-GIG.exe 90 PID 3268 wrote to memory of 400 3268 Explorer.EXE 98 PID 3268 wrote to memory of 400 3268 Explorer.EXE 98 PID 3268 wrote to memory of 400 3268 Explorer.EXE 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\r1210DEC-GIG.exe"C:\Users\Admin\AppData\Local\Temp\r1210DEC-GIG.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\r1210DEC-GIG.exe"C:\Users\Admin\AppData\Local\Temp\r1210DEC-GIG.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1796
-
-
-
C:\Windows\SysWOW64\netiougc.exe"C:\Windows\SysWOW64\netiougc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:400
-