Analysis
-
max time kernel
0s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 01:35
Static task
static1
Behavioral task
behavioral1
Sample
4825d64fc548637adedb9b4b808ed7cd.exe
Resource
win7-20231129-en
General
-
Target
4825d64fc548637adedb9b4b808ed7cd.exe
-
Size
1.4MB
-
MD5
4825d64fc548637adedb9b4b808ed7cd
-
SHA1
0deb418a6c28e89dd31ea69f0edb112162fe91c8
-
SHA256
75811ee3e3c7908fc2804cee757e25aefa4bec5f5aa7ae15f45313f000fa0074
-
SHA512
a7530571caed90ec71ec17439afe89030fcbfbfa12d029d9e21de302bd54fc933ab6acb41975b28718d44b372105b34a3cf3becfdf0484765179cc516b939675
-
SSDEEP
24576:ckJ57Lut19vrBg9qm+BZkvgt7DYOl+FbSoLCwcpN5tgLG6OI8mMe2WLPFouzt:T7LG1V/dBZkY1Yo+X+tgLGPi2WLPFoup
Malware Config
Extracted
raccoon
43aae292cfe6f58a13bd7111bdd7d5ded5b23ec3
-
url4cnc
https://telete.in/brikitiki
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/2408-169-0x0000000008440000-0x0000000008564000-memory.dmp family_zgrat_v1 behavioral1/memory/2408-171-0x0000000008440000-0x000000000855E000-memory.dmp family_zgrat_v1 behavioral1/memory/2408-170-0x0000000008440000-0x000000000855E000-memory.dmp family_zgrat_v1 -
Raccoon Stealer V1 payload 1 IoCs
resource yara_rule behavioral1/memory/1988-2470-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2888 1200 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2336 2408 4825d64fc548637adedb9b4b808ed7cd.exe 29 PID 2408 wrote to memory of 2336 2408 4825d64fc548637adedb9b4b808ed7cd.exe 29 PID 2408 wrote to memory of 2336 2408 4825d64fc548637adedb9b4b808ed7cd.exe 29 PID 2408 wrote to memory of 2336 2408 4825d64fc548637adedb9b4b808ed7cd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4825d64fc548637adedb9b4b808ed7cd.exe"C:\Users\Admin\AppData\Local\Temp\4825d64fc548637adedb9b4b808ed7cd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2292
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1532
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2364
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1856
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Dewgkwlbhkrsncbybkhtfpkb.vbs"2⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exe"C:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exe"3⤵PID:1896
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:1904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:3056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:2008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:2240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:2464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:2832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:1436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:2436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exeC:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exe4⤵PID:600
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ddmmvlnwvosotwcisp.vbs"4⤵PID:604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4825d64fc548637adedb9b4b808ed7cd.exeC:\Users\Admin\AppData\Local\Temp\4825d64fc548637adedb9b4b808ed7cd.exe2⤵PID:1988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com1⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exe"C:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exe"1⤵PID:1704
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2148
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2096
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2624
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exeC:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exe2⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exeC:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exe2⤵PID:1200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 7603⤵
- Program crash
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5eedf5b01d8c6919df80fb4eeef481b96
SHA1c2f13824ede4e9781aa1d231c3bfe65ee57a5202
SHA256c470d243098a7051aa0914fcda227fa4ae3b752556a5de16da5d73a169005aa4
SHA512c9db4dff46d7517270dda041eca132368edc87bac7d0926b5179d7c385696a7b648c2b99bb444a08c60c95fd4dbd01700f17a8c9cb678bef680a8f681d248822
-
Filesize
56KB
MD5a45fed9d730cc4ca81853020704d0a3b
SHA1caae7225e5f90f5db364913595fe498804d44b91
SHA256c853c3d2bad79f76cd06bcd5c5fb34e8d6658bac96da9995ba2227a1b4747554
SHA5126283a20355d9f55552eab8116f99a5e4f82cb02245608c2895c3e1075a155c192b0e807206ad7f6355194880597a55980edb9635368698d650defd91024bfd6a
-
Filesize
1KB
MD52eff9972476a33a9eac1c9f4ca4111dd
SHA14cc633e7bf74db8be9090af39eceefdfe5ffaee4
SHA256dde5e64faf380c431e1780cfe4767ca0d55c4d73626feff149e7889cc0a94969
SHA512975a7ea58ea3b43e237ab4e1faf512bf9dfea4bbbff92fdd6a6914a102f492c353188fef48b150302f704f158c8222c2c95cc8808afa4117299a261b165877ce
-
Filesize
22KB
MD5fbc99ac94400b6b0db224782c48000b8
SHA1cf8a3c3b2010c99f218cea1315515e05e2deb60a
SHA2564eee010deddbde9b9245ceaef3c55037cdbef1bbe74cb471c9cef3f2620c999a
SHA512814ab8d06eb9795281215ba03fb9ec24f37190b3b5343cca3fc8bb15f79b38dde88f7e576f924122f1e66292a4dfbfac1b2758633922d5f09695aca252c39ae0
-
Filesize
34KB
MD56707d83dd828fba77a9573ba6791932b
SHA178dd31933a03035e3f7a318e6f6cab56b5a10b1f
SHA25643b4d8e5708b6096f27e3f4067ac5cd0b00b10ab7fc5b085bb1dadc575434512
SHA5125ef6ed2c4ebba547e1bc5fb7a139582670cbb94ea71be8dd7610f6ab83fc0b16244812649df393b0d9a3b439520fb0939088dd8ae53840356bf782fc2f7546fe
-
Filesize
19KB
MD59218d6b83a9dd5d1669977b47a561e8d
SHA1028d92631f38eae32b2c31aaef33517d53ac3a19
SHA25626f2e43ccc3646b1b284c51ebab68f86c0af091bb73e6186cf8dadae96fb4745
SHA51243d339418b2a610417b3b0d59ceb10029b799362e246053076522c2a89538d9b93dbfc97602d34a340eaec189509742110cdfe2eb8133305f149a0fe0f2a5d70
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD54638e41be7be9ad5ef2257f9fd1cfa4e
SHA1da810ff03c35b32096f569d323b1e0b42999ce19
SHA256368ff63803f82e3ba09b2821c5eab1f6be9d1f3e2da9d22d3060c7742f166c6e
SHA512fd5d3d0e6b5981d631be7ba0485ad242247f26012755d6c79a0a5cbe847d0db45df4f2717c3e227a05291562427ec5a83d360d9b5bfc60420cecbed2097460e1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c4e96bcadf3b0e3f7ab267120b1c848d
SHA15d98ed4941efe714e4ff6c019e8654965e2c36fb
SHA256d90e90bd97eee3fc8787ab6309bc05b700d49553ca764e14053f2f4931c056c2
SHA5123ec727aa4a488b9c1ef22172b1ef106901662a7d515a0a38c3732df1eca5db49a70f968188181f329fa62f0f93836b88e6353c47bbb52611682d0369c72e1db6
-
Filesize
16KB
MD59660df7ad8757415d0016e07ad91706a
SHA1dae2c1f317240aa62207ddd9a3f2ea8191a1c928
SHA25619d23063442a24f7782597e490243b7423d81c6198af52821ede635111f0f32b
SHA512682b6cbdfd59fbe9a767b521c34f289ab8e52e418d711561fe8446dc24e0e4cfea9e8fca719151d1debc9788b74d013a1560af845211d48885a339a5e184e0fc
-
Filesize
28KB
MD598ef897e622e44d285b378f1c2949b3c
SHA1afed68939b864ddcbe924aba324a2a4dfb5542ce
SHA2560c2e7e8705b9d1bb3d7dd4d40dcd534f15e2fb49308783029e37f993fffac513
SHA512d31683f359da76cd47fc43130c40eb40bcd198e575021638c8a848630ab725e148cf1f77e207ef58768b35a19f381e95f628b01ccee6e9533fea991d3349de4f
-
Filesize
33KB
MD51c16086e20ee2fe75e8503b57fd517a7
SHA15f1a3c83e0641f2184303844740bdb5d10d878b3
SHA256877ecc637d5bd115753982a38bd7c543ca70a719cc5e0bfd812a0ee2657cfb87
SHA5123de9d25f5e7d8107eab43be0922f5475efc7cb5979749c48c9d5ebf8b5c33059803df372ea6c8a0a62959180054531b6520aa8fc8f5c01b24aed2d48aba1b262