Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
062e404f794bf1f0aebe06c82bb2204f.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
062e404f794bf1f0aebe06c82bb2204f.exe
-
Size
5.1MB
-
MD5
062e404f794bf1f0aebe06c82bb2204f
-
SHA1
7d4ef888f8168750582d04a9c227bf5c44329e34
-
SHA256
df9932529eb49b70e0511e6a4ecf5fb5e3aa3e14b6e54b07aac2bfee434cd594
-
SHA512
d038a34f8adb353a8b7deb330c0039a1d4ea57193dc552419fcffb0800288ce67d85d0e8dfe2ea9a8b6e4fd6abdf0d3a2200abc912c96dcf2a9c634cb1cf44cb
-
SSDEEP
98304:nxfp60OIol+C5kybsSI44MZYIb3uVnTsLTv32HvdTdyUM2gk:nRA+2HlSM+jVTWv32Jg
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2248-4-0x0000000000A50000-0x0000000000A66000-memory.dmp family_zgrat_v1 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2248 062e404f794bf1f0aebe06c82bb2204f.exe 2248 062e404f794bf1f0aebe06c82bb2204f.exe 2248 062e404f794bf1f0aebe06c82bb2204f.exe 2248 062e404f794bf1f0aebe06c82bb2204f.exe 2248 062e404f794bf1f0aebe06c82bb2204f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2248 062e404f794bf1f0aebe06c82bb2204f.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2252 2248 062e404f794bf1f0aebe06c82bb2204f.exe 25 PID 2248 wrote to memory of 2252 2248 062e404f794bf1f0aebe06c82bb2204f.exe 25 PID 2248 wrote to memory of 2252 2248 062e404f794bf1f0aebe06c82bb2204f.exe 25 PID 2248 wrote to memory of 2252 2248 062e404f794bf1f0aebe06c82bb2204f.exe 25 PID 2248 wrote to memory of 2796 2248 062e404f794bf1f0aebe06c82bb2204f.exe 24 PID 2248 wrote to memory of 2796 2248 062e404f794bf1f0aebe06c82bb2204f.exe 24 PID 2248 wrote to memory of 2796 2248 062e404f794bf1f0aebe06c82bb2204f.exe 24 PID 2248 wrote to memory of 2796 2248 062e404f794bf1f0aebe06c82bb2204f.exe 24 PID 2248 wrote to memory of 2356 2248 062e404f794bf1f0aebe06c82bb2204f.exe 23 PID 2248 wrote to memory of 2356 2248 062e404f794bf1f0aebe06c82bb2204f.exe 23 PID 2248 wrote to memory of 2356 2248 062e404f794bf1f0aebe06c82bb2204f.exe 23 PID 2248 wrote to memory of 2356 2248 062e404f794bf1f0aebe06c82bb2204f.exe 23 PID 2248 wrote to memory of 2264 2248 062e404f794bf1f0aebe06c82bb2204f.exe 22 PID 2248 wrote to memory of 2264 2248 062e404f794bf1f0aebe06c82bb2204f.exe 22 PID 2248 wrote to memory of 2264 2248 062e404f794bf1f0aebe06c82bb2204f.exe 22 PID 2248 wrote to memory of 2264 2248 062e404f794bf1f0aebe06c82bb2204f.exe 22 PID 2248 wrote to memory of 2088 2248 062e404f794bf1f0aebe06c82bb2204f.exe 21 PID 2248 wrote to memory of 2088 2248 062e404f794bf1f0aebe06c82bb2204f.exe 21 PID 2248 wrote to memory of 2088 2248 062e404f794bf1f0aebe06c82bb2204f.exe 21 PID 2248 wrote to memory of 2088 2248 062e404f794bf1f0aebe06c82bb2204f.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:2252
-