Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:10
Behavioral task
behavioral1
Sample
2974c33d71c72bfb8773786d2f5e52b3.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2974c33d71c72bfb8773786d2f5e52b3.exe
-
Size
7.9MB
-
MD5
2974c33d71c72bfb8773786d2f5e52b3
-
SHA1
60fbc450e8fa237fa726e455ed302b3d07230be6
-
SHA256
d7aef37620b6859201152beeb8065afcd6abaff08e7802f091d184b771c6ca67
-
SHA512
c43fe6dbd34d131154e078f45778064ac0ee71508db0511907a4e09ebfb5bb47987b9edb0f382b1fd080d6feeaf41ce0eb6af5bb7cf4f7ef2eda112db5226692
-
SSDEEP
98304:P6GsEi3CVgrqefV75XI48DM+CNEARi4lWbHvj3hAZzyX9teF/AN3R1Q+rT:PjsEiCqB5XlwX0U4lWjvD+ZzyX9OiWS
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/2708-1-0x0000000000CE0000-0x00000000014CC000-memory.dmp family_zgrat_v1 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe 2708 2974c33d71c72bfb8773786d2f5e52b3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2708 2974c33d71c72bfb8773786d2f5e52b3.exe