Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 03:41
Static task
static1
Behavioral task
behavioral1
Sample
d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe
Resource
win10v2004-20231215-en
General
-
Target
d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe
-
Size
47KB
-
MD5
d4ba5e2982463378357486b8d7f656c1
-
SHA1
dd0502d38ad2bb63e57bb71956bb02b38f825c86
-
SHA256
d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d
-
SHA512
cc617ebea4b67e85fc02c56d9099649d88f88d8463e62dc3d78b139baa0c32e3b7b346c584ee4c1dfd3d8d97121e6c39ea4d91bee91fda5d05eb437930a06e37
-
SSDEEP
768:F20/1cyCPJmQcsmC2+vdiS8hYo8gk4nFYiBIuSWC93hxb/xeFe746FCi:F2s1bwJt2Lj8gfii3hC93hX4E4K
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/3672-3-0x0000015975CE0000-0x0000015975D88000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-4-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-5-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-7-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-9-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-11-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-13-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-15-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-17-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-19-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-21-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-23-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-27-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-25-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-29-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-31-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-33-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-35-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-37-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-39-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-41-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-43-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-45-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-47-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-49-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-51-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-53-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-55-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-57-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-59-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-61-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-63-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-65-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 behavioral2/memory/3672-67-0x0000015975CE0000-0x0000015975D83000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\customer = "C:\\Users\\Admin\\AppData\\Roaming\\customer.exe" d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4476 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 94 PID 3672 wrote to memory of 4476 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 94 PID 3672 wrote to memory of 4116 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 95 PID 3672 wrote to memory of 4116 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 95 PID 3672 wrote to memory of 3584 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 96 PID 3672 wrote to memory of 3584 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 96 PID 3672 wrote to memory of 1256 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 97 PID 3672 wrote to memory of 1256 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 97 PID 3672 wrote to memory of 3552 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 98 PID 3672 wrote to memory of 3552 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 98 PID 3672 wrote to memory of 1136 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 99 PID 3672 wrote to memory of 1136 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 99 PID 3672 wrote to memory of 3528 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 100 PID 3672 wrote to memory of 3528 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 100 PID 3672 wrote to memory of 4448 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 101 PID 3672 wrote to memory of 4448 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 101 PID 3672 wrote to memory of 2248 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 102 PID 3672 wrote to memory of 2248 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 102 PID 3672 wrote to memory of 828 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 103 PID 3672 wrote to memory of 828 3672 d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe"C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exeC:\Users\Admin\AppData\Local\Temp\d13bebabc4063d86102cef3bdaed105d826ee3f604986eebefa2e8be3620f29d.exe2⤵PID:828
-