Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 06:38
Static task
static1
Behavioral task
behavioral1
Sample
2becacc54640ee85368060f50cdf970c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2becacc54640ee85368060f50cdf970c.exe
Resource
win10v2004-20231215-en
General
-
Target
2becacc54640ee85368060f50cdf970c.exe
-
Size
1.7MB
-
MD5
2becacc54640ee85368060f50cdf970c
-
SHA1
fc5f72e653bcb507bbb0d8f95b14201930dc3eef
-
SHA256
fffa9ead850e0fcaf571a59b808bf2b2d25b465be4d7300b3f828c63ac779259
-
SHA512
29417107a44f9eef89d3ab35dd2ba52562f41651c04ebc2dd464a76b4a561fbf9aac5f8f35fb53b1f6d4ce8ea85cf66a038d530b6ca3e3368b8477a5da1f3c34
-
SSDEEP
49152:R1cDVEQUeU0PlCzs3nTGgVduWYwaIjctIPVWLp2y:weeUEbTGgOWY8j+z
Malware Config
Extracted
bitrat
1.38
dontreachme.duckdns.org:1337
-
communication_password
7b24afc8bc80e548d66c4e7ff72171c5
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2512-6-0x0000000000850000-0x00000000008C8000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-8-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-10-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-7-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-12-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-14-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-16-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-18-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-20-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-30-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-46-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-50-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-54-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-52-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-56-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-58-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-60-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-70-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-68-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-66-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-64-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-62-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-48-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-44-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-42-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-40-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-38-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-36-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-34-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-32-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-28-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-26-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-24-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-22-0x0000000000850000-0x00000000008C1000-memory.dmp family_zgrat_v1 -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\JavaUpdate\\JavaUpdate.exe\"," 2becacc54640ee85368060f50cdf970c.exe -
Executes dropped EXE 1 IoCs
pid Process 2252 RegAsm.exe -
Loads dropped DLL 2 IoCs
pid Process 2512 2becacc54640ee85368060f50cdf970c.exe 2252 RegAsm.exe -
resource yara_rule behavioral1/memory/2252-2426-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/2252-2444-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2252 RegAsm.exe 2252 RegAsm.exe 2252 RegAsm.exe 2252 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2512 set thread context of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2512 2becacc54640ee85368060f50cdf970c.exe 2512 2becacc54640ee85368060f50cdf970c.exe 1916 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2512 2becacc54640ee85368060f50cdf970c.exe Token: SeDebugPrivilege 1916 powershell.exe Token: SeDebugPrivilege 2252 RegAsm.exe Token: SeShutdownPrivilege 2252 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2252 RegAsm.exe 2252 RegAsm.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2512 wrote to memory of 532 2512 2becacc54640ee85368060f50cdf970c.exe 30 PID 2512 wrote to memory of 532 2512 2becacc54640ee85368060f50cdf970c.exe 30 PID 2512 wrote to memory of 532 2512 2becacc54640ee85368060f50cdf970c.exe 30 PID 2512 wrote to memory of 532 2512 2becacc54640ee85368060f50cdf970c.exe 30 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31 PID 532 wrote to memory of 1916 532 WScript.exe 32 PID 532 wrote to memory of 1916 532 WScript.exe 32 PID 532 wrote to memory of 1916 532 WScript.exe 32 PID 532 wrote to memory of 1916 532 WScript.exe 32 PID 2512 wrote to memory of 2252 2512 2becacc54640ee85368060f50cdf970c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2becacc54640ee85368060f50cdf970c.exe"C:\Users\Admin\AppData\Local\Temp\2becacc54640ee85368060f50cdf970c.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Enobllqetjhztazrykyqe.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Local\JavaUpdate\JavaUpdate.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD575fda8189e60e05655aea55fe68591c0
SHA1de2177e12403c59f81d278497a387089ddd10d73
SHA256cf8322af201e7b0f5d5b2b93c0df541c8785436ebdf04a32addc46b13caf81c5
SHA5121bc581cbe6ba2f7f9a419bdb9b582ec5585d5cdfd8e245cab19c269d2bd4ecbc151cd98996b8d5f330304fda243c4a13388f1c601111dbab59fd0ad35e5ea647
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab