Analysis

  • max time kernel
    30s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 19:20

General

  • Target

    f206fcd4c9308dbd966384dc94ea6811.exe

  • Size

    451KB

  • MD5

    f206fcd4c9308dbd966384dc94ea6811

  • SHA1

    49e1c7affefcbdc4a69ce941704b63f0508760de

  • SHA256

    301042d2e4c7c38c45d27312dffcd8260060bc8d98ddb510dbbf7f52f1f0f151

  • SHA512

    efcce74dc0f7a326a54f7b7a999071236f92d1f0930630f10dbd070e4c3c4d4aef43dcaaa1d570ccb665f39490889529b4a87d73109f83f4477d60c9f2e49789

  • SSDEEP

    6144:vuS/mbZR6tzw+HYzXfjn7FdXjxTpUQPY5e9JfQ3EIY0FY:XmbZRp+4pxxJY5cQ3EIYR

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f206fcd4c9308dbd966384dc94ea6811.exe
    "C:\Users\Admin\AppData\Local\Temp\f206fcd4c9308dbd966384dc94ea6811.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\f206fcd4c9308dbd966384dc94ea6811.exe
      "C:\Users\Admin\AppData\Local\Temp\f206fcd4c9308dbd966384dc94ea6811.exe"
      2⤵
        PID:2720
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Roaming\ugbeh.vbs
          3⤵
            PID:1652

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1992-18-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/1992-0-0x0000000000100000-0x0000000000176000-memory.dmp

        Filesize

        472KB

      • memory/1992-2-0x00000000048C0000-0x0000000004900000-memory.dmp

        Filesize

        256KB

      • memory/1992-3-0x0000000000970000-0x00000000009B8000-memory.dmp

        Filesize

        288KB

      • memory/1992-1-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/2720-14-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2720-16-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2720-17-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/2720-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2720-12-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2720-8-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2720-7-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2720-21-0x0000000074C70000-0x000000007535E000-memory.dmp

        Filesize

        6.9MB

      • memory/2720-6-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2720-5-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB