Analysis
-
max time kernel
6s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 07:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
122341d7b40c0ee5ad9eb4b5e56a5ed8.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
122341d7b40c0ee5ad9eb4b5e56a5ed8.exe
-
Size
2.2MB
-
MD5
122341d7b40c0ee5ad9eb4b5e56a5ed8
-
SHA1
c1c929d53da34787cfd8381b3ea6a3c2c1ba1a33
-
SHA256
c3e53e28198dfe92caa7b46355f543dd18c0353ef42f2e28862682a79e863735
-
SHA512
50051b14cd8cd755fe68bbce63050c9db5bb0769ef75025ea634785fdc5af77b307b955f84381d6eb7dc698be406581ac5af2165666b9c0e42e6519765c3d5af
-
SSDEEP
49152:IODX0Ctbcjd/r7bDDjeDEngIJdaaT2imnlhLEyeHtwuSZNIQ:Ttb2HD1ngOTSnlBpCSuSZ
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
firewall.publicvm.com:25874
Attributes
-
communication_password
a20ba4fb329f7dc66c0dd3562e9f9984
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/1708-23-0x0000000007EA0000-0x0000000007F0C000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-33-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-49-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-75-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-87-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-85-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-83-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-81-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-79-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-77-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-73-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-71-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-69-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-67-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-65-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-63-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-61-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-59-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-57-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-55-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-53-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-51-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-47-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-45-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-43-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-41-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-39-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-37-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-35-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-31-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-29-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-27-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-25-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 behavioral1/memory/1708-24-0x0000000007EA0000-0x0000000007F06000-memory.dmp family_zgrat_v1 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1800 1708 122341d7b40c0ee5ad9eb4b5e56a5ed8.exe 28 PID 1708 wrote to memory of 1800 1708 122341d7b40c0ee5ad9eb4b5e56a5ed8.exe 28 PID 1708 wrote to memory of 1800 1708 122341d7b40c0ee5ad9eb4b5e56a5ed8.exe 28 PID 1708 wrote to memory of 1800 1708 122341d7b40c0ee5ad9eb4b5e56a5ed8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\122341d7b40c0ee5ad9eb4b5e56a5ed8.exe"C:\Users\Admin\AppData\Local\Temp\122341d7b40c0ee5ad9eb4b5e56a5ed8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Write-Output Hello World2⤵PID:1800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Write-Output Hello World2⤵PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵PID:2672
-