Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 06:46
Behavioral task
behavioral1
Sample
1160b9510cfb408faee17ec57fb728b9.exe
Resource
win7-20231129-en
General
-
Target
1160b9510cfb408faee17ec57fb728b9.exe
-
Size
1.5MB
-
MD5
1160b9510cfb408faee17ec57fb728b9
-
SHA1
283cc745e5532ba5a53f78b6a4a564a4f655cdbb
-
SHA256
3041de101c4097ef99160b98653a51d3a92b487da293e08f019fb85cb54edd35
-
SHA512
29182201305adcca77616caab939f6fcb77f1d032ac47babcbe389d33585fd39c45033752979edda70454c690651d8eb3f34937c80fdb063bc69f4d65b2ebd61
-
SSDEEP
24576:hmgk70TrcnXpatsCu7IfLKZnikPhhUF54clNf7+6uHAW92zt/sWu2BSMCqDoRRP:hmgkQTA5Qw7CSikJo54clgLH+tkWJ0N7
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2752-21-0x00000000049F0000-0x0000000004A8A000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-27-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-41-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-59-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-63-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-61-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-75-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-85-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-83-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-81-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-79-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-77-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-73-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-71-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-69-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-67-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-65-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-57-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-55-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-53-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-51-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-49-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-47-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-45-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-43-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-39-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-37-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-35-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-33-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-31-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-29-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-25-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-23-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-22-0x00000000049F0000-0x0000000004A84000-memory.dmp family_zgrat_v1 behavioral1/memory/2752-16-0x0000000004A90000-0x0000000004B2C000-memory.dmp family_zgrat_v1 -
Detects Echelon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2536-0-0x0000000000CC0000-0x0000000000E44000-memory.dmp family_echelon behavioral1/memory/2752-19-0x00000000049B0000-0x00000000049F0000-memory.dmp family_echelon -
Executes dropped EXE 1 IoCs
Processes:
Decoder.exepid Process 2752 Decoder.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org 7 freegeoip.app 8 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Decoder.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Decoder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Decoder.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2648 timeout.exe -
Processes:
Decoder.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Decoder.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Decoder.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C Decoder.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Decoder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Decoder.exepid Process 2752 Decoder.exe 2752 Decoder.exe 2752 Decoder.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1160b9510cfb408faee17ec57fb728b9.exeDecoder.exedescription pid Process Token: SeDebugPrivilege 2536 1160b9510cfb408faee17ec57fb728b9.exe Token: SeDebugPrivilege 2752 Decoder.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1160b9510cfb408faee17ec57fb728b9.execmd.exedescription pid Process procid_target PID 2536 wrote to memory of 2752 2536 1160b9510cfb408faee17ec57fb728b9.exe 32 PID 2536 wrote to memory of 2752 2536 1160b9510cfb408faee17ec57fb728b9.exe 32 PID 2536 wrote to memory of 2752 2536 1160b9510cfb408faee17ec57fb728b9.exe 32 PID 2536 wrote to memory of 2752 2536 1160b9510cfb408faee17ec57fb728b9.exe 32 PID 2536 wrote to memory of 2644 2536 1160b9510cfb408faee17ec57fb728b9.exe 31 PID 2536 wrote to memory of 2644 2536 1160b9510cfb408faee17ec57fb728b9.exe 31 PID 2536 wrote to memory of 2644 2536 1160b9510cfb408faee17ec57fb728b9.exe 31 PID 2644 wrote to memory of 2648 2644 cmd.exe 29 PID 2644 wrote to memory of 2648 2644 cmd.exe 29 PID 2644 wrote to memory of 2648 2644 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1160b9510cfb408faee17ec57fb728b9.exe"C:\Users\Admin\AppData\Local\Temp\1160b9510cfb408faee17ec57fb728b9.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""2⤵
- Suspicious use of WriteProcessMemory
PID:2644
-
-
C:\ProgramData\Decoder.exe"C:\ProgramData\Decoder.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\system32\timeout.exetimeout 41⤵
- Delays execution with timeout.exe
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD5c29c0d495ed13e703f433d53bdffdab8
SHA174ed36e6b6027b61abcfe2956670ffd9de7fd71a
SHA25620309707aa6fc678963aace7685a37839d439c850b1ba399bdbfbbeddc10ed4b
SHA512fea4c1066ee6df3ebb29a354678a3d0f1398cd216b92b261296fcff580b00e19cefe24d975beebcc41854cceef3df2702d569811358dae4203a924fb52cf5426
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
199B
MD5ebd697759e22c1a18c707f3e815e21f3
SHA1a9e028678c2bc1589250488b24e7b0ea4fac992d
SHA2565dd6bbf9e4f02b5caa933c370e9610688352f4f6702dac1d237076aeb1b7d445
SHA512fed3b00951dc59f922c0420f74aa37fca5f906d3ba0b8e04672feefcab0f4e9c0e1b10427e7a20697423d335739032d51134ed75d31f1e1b5d1369814119401d
-
Filesize
28B
MD5217407484aac2673214337def8886072
SHA10f8c4c94064ce1f7538c43987feb5bb2d7fec0c6
SHA256467c28ed423f513128575b1c8c6674ee5671096ff1b14bc4c32deebd89fc1797
SHA5128466383a1cb71ea8b049548fd5a41aaf01c0423743b886cd3cb5007f66bff87d8d5cfa67344451f4490c8f26e4ebf9e306075d5cfc655dc62f0813a456cf1330