Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 22:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
062e404f794bf1f0aebe06c82bb2204f.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
062e404f794bf1f0aebe06c82bb2204f.exe
-
Size
5.1MB
-
MD5
062e404f794bf1f0aebe06c82bb2204f
-
SHA1
7d4ef888f8168750582d04a9c227bf5c44329e34
-
SHA256
df9932529eb49b70e0511e6a4ecf5fb5e3aa3e14b6e54b07aac2bfee434cd594
-
SHA512
d038a34f8adb353a8b7deb330c0039a1d4ea57193dc552419fcffb0800288ce67d85d0e8dfe2ea9a8b6e4fd6abdf0d3a2200abc912c96dcf2a9c634cb1cf44cb
-
SSDEEP
98304:nxfp60OIol+C5kybsSI44MZYIb3uVnTsLTv32HvdTdyUM2gk:nRA+2HlSM+jVTWv32Jg
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
omeno.duckdns.org:5867
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/1572-7-0x0000000002C80000-0x0000000002C96000-memory.dmp family_zgrat_v1 -
resource yara_rule behavioral2/memory/4768-8-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-10-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-12-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-13-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-11-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-15-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-17-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-19-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-21-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-23-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-22-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-20-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-18-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-25-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-26-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-28-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-29-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-30-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-32-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-33-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-35-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-36-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-38-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-39-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-41-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-42-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-44-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-45-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-47-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-48-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-50-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4768-51-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4768 062e404f794bf1f0aebe06c82bb2204f.exe 4768 062e404f794bf1f0aebe06c82bb2204f.exe 4768 062e404f794bf1f0aebe06c82bb2204f.exe 4768 062e404f794bf1f0aebe06c82bb2204f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1572 set thread context of 4768 1572 062e404f794bf1f0aebe06c82bb2204f.exe 92 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1572 062e404f794bf1f0aebe06c82bb2204f.exe 1572 062e404f794bf1f0aebe06c82bb2204f.exe 1572 062e404f794bf1f0aebe06c82bb2204f.exe 1572 062e404f794bf1f0aebe06c82bb2204f.exe 1572 062e404f794bf1f0aebe06c82bb2204f.exe 1572 062e404f794bf1f0aebe06c82bb2204f.exe 1572 062e404f794bf1f0aebe06c82bb2204f.exe 1572 062e404f794bf1f0aebe06c82bb2204f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1572 062e404f794bf1f0aebe06c82bb2204f.exe Token: SeShutdownPrivilege 4768 062e404f794bf1f0aebe06c82bb2204f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4768 062e404f794bf1f0aebe06c82bb2204f.exe 4768 062e404f794bf1f0aebe06c82bb2204f.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4572 1572 062e404f794bf1f0aebe06c82bb2204f.exe 91 PID 1572 wrote to memory of 4572 1572 062e404f794bf1f0aebe06c82bb2204f.exe 91 PID 1572 wrote to memory of 4572 1572 062e404f794bf1f0aebe06c82bb2204f.exe 91 PID 1572 wrote to memory of 3392 1572 062e404f794bf1f0aebe06c82bb2204f.exe 96 PID 1572 wrote to memory of 3392 1572 062e404f794bf1f0aebe06c82bb2204f.exe 96 PID 1572 wrote to memory of 3392 1572 062e404f794bf1f0aebe06c82bb2204f.exe 96 PID 1572 wrote to memory of 60 1572 062e404f794bf1f0aebe06c82bb2204f.exe 94 PID 1572 wrote to memory of 60 1572 062e404f794bf1f0aebe06c82bb2204f.exe 94 PID 1572 wrote to memory of 60 1572 062e404f794bf1f0aebe06c82bb2204f.exe 94 PID 1572 wrote to memory of 1756 1572 062e404f794bf1f0aebe06c82bb2204f.exe 93 PID 1572 wrote to memory of 1756 1572 062e404f794bf1f0aebe06c82bb2204f.exe 93 PID 1572 wrote to memory of 1756 1572 062e404f794bf1f0aebe06c82bb2204f.exe 93 PID 1572 wrote to memory of 4768 1572 062e404f794bf1f0aebe06c82bb2204f.exe 92 PID 1572 wrote to memory of 4768 1572 062e404f794bf1f0aebe06c82bb2204f.exe 92 PID 1572 wrote to memory of 4768 1572 062e404f794bf1f0aebe06c82bb2204f.exe 92 PID 1572 wrote to memory of 4768 1572 062e404f794bf1f0aebe06c82bb2204f.exe 92 PID 1572 wrote to memory of 4768 1572 062e404f794bf1f0aebe06c82bb2204f.exe 92 PID 1572 wrote to memory of 4768 1572 062e404f794bf1f0aebe06c82bb2204f.exe 92 PID 1572 wrote to memory of 4768 1572 062e404f794bf1f0aebe06c82bb2204f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"C:\Users\Admin\AppData\Local\Temp\062e404f794bf1f0aebe06c82bb2204f.exe"2⤵PID:3392
-