Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:45
Static task
static1
Behavioral task
behavioral1
Sample
35755b2520fd50c49cbdcce4627a79ae.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
General
-
Target
35755b2520fd50c49cbdcce4627a79ae.exe
-
Size
944KB
-
MD5
35755b2520fd50c49cbdcce4627a79ae
-
SHA1
03d5ca3ba3eb3a6b92f2038248510cea88ea3952
-
SHA256
36c04fff4cb95fcc397afe6ab4d32a3e9dc9c4d68e621f56dd9f8ae975a4a1fe
-
SHA512
124943e2486c9ac50ee9a883f0b230447cf8de3f29cd0c299a3cb457a2f58cbb26681fdabdd2368bf72301a304a53c6b0d0e6870544e487b1cae58d8e97febbc
-
SSDEEP
12288:bGH/W5wqrqsyLDMKKMBhHsvhw46Dd9QC1uv3JVMO0PbkDaNarG3i6va/4JN5J:bceI1HfHs7U0/JGA20Gy6i/e9
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1256-5-0x00000000002F0000-0x0000000000302000-memory.dmp family_zgrat_v1 -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
35755b2520fd50c49cbdcce4627a79ae.exedescription pid Process procid_target PID 1256 set thread context of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2828 2824 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
35755b2520fd50c49cbdcce4627a79ae.exepid Process 1256 35755b2520fd50c49cbdcce4627a79ae.exe 1256 35755b2520fd50c49cbdcce4627a79ae.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
35755b2520fd50c49cbdcce4627a79ae.exe35755b2520fd50c49cbdcce4627a79ae.exedescription pid Process Token: SeDebugPrivilege 1256 35755b2520fd50c49cbdcce4627a79ae.exe Token: SeDebugPrivilege 2824 35755b2520fd50c49cbdcce4627a79ae.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
35755b2520fd50c49cbdcce4627a79ae.exe35755b2520fd50c49cbdcce4627a79ae.exedescription pid Process procid_target PID 1256 wrote to memory of 2760 1256 35755b2520fd50c49cbdcce4627a79ae.exe 30 PID 1256 wrote to memory of 2760 1256 35755b2520fd50c49cbdcce4627a79ae.exe 30 PID 1256 wrote to memory of 2760 1256 35755b2520fd50c49cbdcce4627a79ae.exe 30 PID 1256 wrote to memory of 2760 1256 35755b2520fd50c49cbdcce4627a79ae.exe 30 PID 1256 wrote to memory of 2932 1256 35755b2520fd50c49cbdcce4627a79ae.exe 31 PID 1256 wrote to memory of 2932 1256 35755b2520fd50c49cbdcce4627a79ae.exe 31 PID 1256 wrote to memory of 2932 1256 35755b2520fd50c49cbdcce4627a79ae.exe 31 PID 1256 wrote to memory of 2932 1256 35755b2520fd50c49cbdcce4627a79ae.exe 31 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 1256 wrote to memory of 2824 1256 35755b2520fd50c49cbdcce4627a79ae.exe 32 PID 2824 wrote to memory of 2828 2824 35755b2520fd50c49cbdcce4627a79ae.exe 34 PID 2824 wrote to memory of 2828 2824 35755b2520fd50c49cbdcce4627a79ae.exe 34 PID 2824 wrote to memory of 2828 2824 35755b2520fd50c49cbdcce4627a79ae.exe 34 PID 2824 wrote to memory of 2828 2824 35755b2520fd50c49cbdcce4627a79ae.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\35755b2520fd50c49cbdcce4627a79ae.exe"C:\Users\Admin\AppData\Local\Temp\35755b2520fd50c49cbdcce4627a79ae.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\35755b2520fd50c49cbdcce4627a79ae.exe"C:\Users\Admin\AppData\Local\Temp\35755b2520fd50c49cbdcce4627a79ae.exe"2⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\35755b2520fd50c49cbdcce4627a79ae.exe"C:\Users\Admin\AppData\Local\Temp\35755b2520fd50c49cbdcce4627a79ae.exe"2⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\35755b2520fd50c49cbdcce4627a79ae.exe"C:\Users\Admin\AppData\Local\Temp\35755b2520fd50c49cbdcce4627a79ae.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 13643⤵
- Program crash
PID:2828
-
-