Analysis
-
max time kernel
63s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 22:14
Static task
static1
Behavioral task
behavioral1
Sample
05595fa61734a9acede85154fc8fe03b.exe
Resource
win7-20231215-en
General
-
Target
05595fa61734a9acede85154fc8fe03b.exe
-
Size
1.7MB
-
MD5
05595fa61734a9acede85154fc8fe03b
-
SHA1
c3842ef0d4b88b53098c9fcb36082219f39b112f
-
SHA256
9d077371cd1d6dc2b8b337d0bc978afb1e910a947bb0e14c15a37c70c745704c
-
SHA512
9e959d30eac39b3fe81f36360f29f4ecdc2c5d7b5b71a12c593f0754860e696822530e022552db3c0d9c1df189a18425bb7030bf7a0d869331a2bbda154f6066
-
SSDEEP
49152:yopU78Oe8T6UQJ+Ss4ie6tu4HY90Jm9WbV:y+E1e87Y+QKZm9WbV
Malware Config
Extracted
bitrat
1.38
eter102.dvrlists.com:3050
-
communication_password
fea0f7015af40ae69a386f06f28a8d31
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/2236-8-0x0000000006B50000-0x0000000006BC8000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-22-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-24-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-40-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-58-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-72-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-70-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-68-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-66-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-64-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-62-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-60-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-56-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-54-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-52-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-50-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-48-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-46-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-44-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-42-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-38-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-36-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-34-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-32-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-30-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-28-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-26-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-20-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-18-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-16-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-14-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-12-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-10-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 behavioral2/memory/2236-9-0x0000000006B50000-0x0000000006BC2000-memory.dmp family_zgrat_v1 -
resource yara_rule behavioral2/memory/2216-2405-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/2216-2466-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 05595fa61734a9acede85154fc8fe03b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b.exe"C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Glkcwxl.vbs"2⤵PID:4384
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\outlook.exe'3⤵PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b.exeC:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b.exe2⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b.exeC:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b.exe2⤵PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b.exeC:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b.exe2⤵PID:1156
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137B
MD541c8a8551ff6fc7a2b9aadcff976ca0f
SHA1444db8be2af0b1128229ac46e4963e0570159c3c
SHA256bc147b5a209f5db13fa86ce6906be0d4dfec76469af3f304d490f10443cf5df5
SHA512b52b716c3827a20d9298a32c8243f8e506c77c4be10e29e39a17ba303d0c65d70e257ab4f1c7368e99608c53ec12e6a1e7287e3d644df1f4cdbc539a501763c8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82