Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 05:01
Static task
static1
Behavioral task
behavioral1
Sample
c58af9384d71e33bae1d8a032d9e7b19.exe
Resource
win7-20231215-en
General
-
Target
c58af9384d71e33bae1d8a032d9e7b19.exe
-
Size
4.0MB
-
MD5
c58af9384d71e33bae1d8a032d9e7b19
-
SHA1
15bd308104a7b2d05ba9fd03b3a4c5410afabc56
-
SHA256
77189b22dfb8238a4837f95e3283150bca8105d618cc421cde8170644bcf878b
-
SHA512
ac80eb00dcf2aec8a56e071281030b9c3ec57460b2a2c59b8db43ce51a60465a419ed1e5f887d7e2d8b41c0aaca226244bb52e7c72cccf44f477fcdad03aa3e8
-
SSDEEP
49152:PSzzgkLJWvg/RdFy7/QhWwALywBDyVt4kWzzwskrk4NZXuMk6o9ufAXV4AK:
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/2352-24-0x00000000048E0000-0x000000000497C000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-29-0x0000000004840000-0x00000000048DA000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-30-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-31-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-33-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-35-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-37-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-39-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-41-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-43-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-45-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-47-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-49-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-51-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-53-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-55-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-57-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-59-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-61-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-63-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-65-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-67-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-69-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-73-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-75-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-71-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-77-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-79-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-81-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-83-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-85-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-87-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-89-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-91-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-93-0x0000000004840000-0x00000000048D4000-memory.dmp family_zgrat_v1 -
Detects Echelon Stealer payload 2 IoCs
resource yara_rule behavioral1/files/0x000900000001225c-5.dat family_echelon behavioral1/memory/2156-7-0x0000000000B90000-0x0000000000D14000-memory.dmp family_echelon -
Executes dropped EXE 2 IoCs
pid Process 2156 WinNetCache.exe 2352 Decoder.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org 4 freegeoip.app 5 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Decoder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Decoder.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3040 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2352 Decoder.exe 2352 Decoder.exe 2352 Decoder.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2156 WinNetCache.exe Token: SeDebugPrivilege 2352 Decoder.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2156 3036 c58af9384d71e33bae1d8a032d9e7b19.exe 28 PID 3036 wrote to memory of 2156 3036 c58af9384d71e33bae1d8a032d9e7b19.exe 28 PID 3036 wrote to memory of 2156 3036 c58af9384d71e33bae1d8a032d9e7b19.exe 28 PID 2156 wrote to memory of 2352 2156 WinNetCache.exe 30 PID 2156 wrote to memory of 2352 2156 WinNetCache.exe 30 PID 2156 wrote to memory of 2352 2156 WinNetCache.exe 30 PID 2156 wrote to memory of 2352 2156 WinNetCache.exe 30 PID 2156 wrote to memory of 2860 2156 WinNetCache.exe 31 PID 2156 wrote to memory of 2860 2156 WinNetCache.exe 31 PID 2156 wrote to memory of 2860 2156 WinNetCache.exe 31 PID 2860 wrote to memory of 3040 2860 cmd.exe 33 PID 2860 wrote to memory of 3040 2860 cmd.exe 33 PID 2860 wrote to memory of 3040 2860 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c58af9384d71e33bae1d8a032d9e7b19.exe"C:\Users\Admin\AppData\Local\Temp\c58af9384d71e33bae1d8a032d9e7b19.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\WinNetCache\WinNetCache.exe"C:\Users\Admin\AppData\Roaming\WinNetCache\WinNetCache.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\ProgramData\Decoder.exe"C:\ProgramData\Decoder.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""3⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\timeout.exetimeout 44⤵
- Delays execution with timeout.exe
PID:3040
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD5c29c0d495ed13e703f433d53bdffdab8
SHA174ed36e6b6027b61abcfe2956670ffd9de7fd71a
SHA25620309707aa6fc678963aace7685a37839d439c850b1ba399bdbfbbeddc10ed4b
SHA512fea4c1066ee6df3ebb29a354678a3d0f1398cd216b92b261296fcff580b00e19cefe24d975beebcc41854cceef3df2702d569811358dae4203a924fb52cf5426
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
216B
MD57e37cf334542a24e809b4b9aa46caf1e
SHA1ec0fe7832a1dcc98cc743a9d7922646c0f6d5592
SHA256bc7880c8f1f561adc5d997776c6f594ecf6003e66d0645b20c28bdde36655de7
SHA512c4d03caf05906f4a90ec88d9a602765348b947e6d9db79c98007525f4218fc9fa2ccaa6b2dd9a75736a61f1a4b54e05f260661d6a031061e43e102ae4f57a276
-
Filesize
28B
MD5217407484aac2673214337def8886072
SHA10f8c4c94064ce1f7538c43987feb5bb2d7fec0c6
SHA256467c28ed423f513128575b1c8c6674ee5671096ff1b14bc4c32deebd89fc1797
SHA5128466383a1cb71ea8b049548fd5a41aaf01c0423743b886cd3cb5007f66bff87d8d5cfa67344451f4490c8f26e4ebf9e306075d5cfc655dc62f0813a456cf1330
-
Filesize
1.5MB
MD5ad2f6dd54f8a52708148b9fe50f7ede9
SHA120b3284ad569811a6f28a39a92b6da61d2713079
SHA25659c3fc7329bf3f09b892d86419da8d1872dc2262683ec45b348a1c27993133b0
SHA5127f2c297b294a20edf52e63eaf7311883295b6bd5c6cd14e839ba8174dabcb353df4536976ba680f647311cfc86f6952f82a0508a6b6dbfe03fbdac7a7e3b57af