Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
d030ec06a1d021fb435d8459a929db7b.exe
Resource
win7-20231215-en
General
-
Target
d030ec06a1d021fb435d8459a929db7b.exe
-
Size
731KB
-
MD5
d030ec06a1d021fb435d8459a929db7b
-
SHA1
155e20d350f9d2223bdd9c5dc30ad2969f077487
-
SHA256
cf53005d2d146dadf6dc95287bbcd1a50c8687711ebf8d497535f14ae423d6c3
-
SHA512
f46a8fd4016911c8bea1c579b89899173d65e019d8caae6ada6bac52d4a85ee734294b9622ce762d255fb0c6903e1040b33fdc71fecffd8d70ec225624b07786
-
SSDEEP
12288:aPOlblXqp28GxW8ULUwC5Y/pT2UZI2PvSSR0o6y2/:aUtqpDCHU4MpT2UVPvSSR0o6y2
Malware Config
Extracted
xloader
2.3
u6f4
cleverokids.site
thecannabisawards.vegas
shopbelleofthebarns.com
digitalizamimundo.com
surschool.com
lowbrowprintshop.com
gx17.net
transformafter50.info
lilygildersguild.com
hubcitypaving.com
safemarketingagency.net
suka-cbd.com
leseditionstadine.com
affreciea.com
lamozi.com
csliu.com
drgustavoamadorotorrino.com
trimatrik.digital
diamondtoolz.net
lumerianpriestess.com
thee-rebellion.com
zeefinetech.com
shelleymontreuil.com
waistshape.com
crazydildo.com
1telefonoatencion24horas.com
romanostrowskimed.com
zhenpu.club
au47.com
electrofranco.com
thecesgop.com
resortathome.site
xn--h10bj6ubnhwvp.com
precisiondrywallaberdeen.com
carolesuedegnanfineart.com
hermsworld.com
yiyingaa.com
ellentool.com
birgulemarket.com
dukaan101.net
loansusatitle.com
aura.wtf
mystorageunitinfoca.com
cadwro.com
thuychung.net
teslalaboratorys.com
blackonblacklov.com
chinasbtc.club
hawaiiprivateyoga.com
terraliquid.com
oklahomarvsales.com
industrialwashbooth.com
smarteryou6g44.club
puequefun.com
sabitcoskun.xyz
helobos.com
luxuriousshoesnets.com
simdep18.com
digitalongoin.net
peaceful-protestors.com
autorolla.com
hetfreeblueprint.com
hugsher.com
blun33.com
stagesfolder.store
Signatures
-
Detect ZGRat V1 19 IoCs
resource yara_rule behavioral1/memory/2024-137-0x0000000004FC0000-0x000000000501A000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-155-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-171-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-169-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-167-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-165-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-163-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-161-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-159-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-157-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-153-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-151-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-149-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-147-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-145-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-143-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-141-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-139-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 behavioral1/memory/2024-138-0x0000000004FC0000-0x0000000005014000-memory.dmp family_zgrat_v1 -
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2160-1927-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2004 2024 d030ec06a1d021fb435d8459a929db7b.exe 21 PID 2024 wrote to memory of 2004 2024 d030ec06a1d021fb435d8459a929db7b.exe 21 PID 2024 wrote to memory of 2004 2024 d030ec06a1d021fb435d8459a929db7b.exe 21 PID 2024 wrote to memory of 2004 2024 d030ec06a1d021fb435d8459a929db7b.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\d030ec06a1d021fb435d8459a929db7b.exe"C:\Users\Admin\AppData\Local\Temp\d030ec06a1d021fb435d8459a929db7b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:3052
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:3028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2864
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1420
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\d030ec06a1d021fb435d8459a929db7b.exeC:\Users\Admin\AppData\Local\Temp\d030ec06a1d021fb435d8459a929db7b.exe2⤵PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E48ACULDVUN64GDAF6CT.temp
Filesize7KB
MD5913b74a15a7cf9d3ecc93650a575acf6
SHA1a1d2aa4f7a84e2d270cac5668c832de014bba0ea
SHA2568f1aa7992b4c8f0b127f547cd248254a9e9d680514010ea13d498a73500f4581
SHA512eeff0b2b2a8129a7d59d43ab855cdef1ddac6c773f9774bcd506a973a7645ab3f8558acaf880f7c0205ac87fc4be5e8414194158219da89b1ba07fd5a1f78b3d