Analysis
-
max time kernel
9s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 22:10
Behavioral task
behavioral1
Sample
3b2fd6cfa20b53ed6d5d55c97ba3884f.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
3b2fd6cfa20b53ed6d5d55c97ba3884f.exe
-
Size
1.5MB
-
MD5
3b2fd6cfa20b53ed6d5d55c97ba3884f
-
SHA1
a19518b371bc708790bab3f3769d9472559a7de5
-
SHA256
9258fb579d6597ae1cb061dc2dfcd3fdbc6d689f4844bae159bb3f75b9c1b8f6
-
SHA512
339b9da108e46690d2c3363c8bedd1bb1f05b6e538b4befc49a44955a3a7f337a4f3e8605b42a15ac1ab36834318e7a82de191d759c05c6291d0551591551f73
-
SSDEEP
24576:ox1k70TrcnXpatsCu7IfLKZnikPhhUF54clNf7+6uHAW92zt/sWu2BSMCqD8kgbS:ox1kQTA5Qw7CSikJo54clgLH+tkWJ0Zb
Malware Config
Signatures
-
Detect ZGRat V1 13 IoCs
Processes:
resource yara_rule behavioral1/memory/2920-18-0x0000000004830000-0x00000000048CC000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-21-0x0000000004790000-0x000000000482A000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-22-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-27-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-35-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-41-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-39-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-37-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-33-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-31-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-29-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-25-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 behavioral1/memory/2920-23-0x0000000004790000-0x0000000004824000-memory.dmp family_zgrat_v1 -
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-0-0x00000000001B0000-0x0000000000334000-memory.dmp family_echelon -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 5 freegeoip.app 2 api.ipify.org 3 api.ipify.org -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2596 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3b2fd6cfa20b53ed6d5d55c97ba3884f.exedescription pid Process Token: SeDebugPrivilege 1704 3b2fd6cfa20b53ed6d5d55c97ba3884f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b2fd6cfa20b53ed6d5d55c97ba3884f.exe"C:\Users\Admin\AppData\Local\Temp\3b2fd6cfa20b53ed6d5d55c97ba3884f.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""2⤵PID:2568
-
C:\Windows\system32\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:2596
-
-
-
C:\ProgramData\Decoder.exe"C:\ProgramData\Decoder.exe"2⤵PID:2920
-