Analysis
-
max time kernel
0s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:01
Static task
static1
Behavioral task
behavioral1
Sample
371b336da91abd01bf0522c7cbf47934.exe
Resource
win7-20231129-en
General
-
Target
371b336da91abd01bf0522c7cbf47934.exe
-
Size
2.9MB
-
MD5
371b336da91abd01bf0522c7cbf47934
-
SHA1
dca225e7018a9b628f2ae0998e6a01e7576751e4
-
SHA256
28952976aeedba181c346d3180d389d540c7a341b69e23d92529825820c4d06e
-
SHA512
52105ae02bab6066011e9bc9e4b06a2e79f90c92164974bc6508214c9234b04b29aeddc5715e73fe2fd93bc7b03644baf301f5e06c12243063e0361a56e55446
-
SSDEEP
49152:x6PaI2dBi0xNC76XQX5a+8kE3Qf+d1MqVhd+qnpWu1oEcBONXobPTTZy78kx0y2A:GaRB9xN46XQX5a+WQ2v+qnp9QO+rYItI
Malware Config
Extracted
bitrat
1.38
firewall.publicvm.com:25874
-
communication_password
a20ba4fb329f7dc66c0dd3562e9f9984
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/3796-36-0x0000000006EE0000-0x0000000006F60000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-38-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-58-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-78-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-94-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-100-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-98-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-96-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-92-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-90-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-88-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-86-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-84-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-82-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-80-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-76-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-74-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-72-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-70-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-68-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-66-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-64-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-62-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-60-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-56-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-54-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-52-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-50-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-48-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-46-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-44-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-42-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-40-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 behavioral2/memory/3796-37-0x0000000006EE0000-0x0000000006F5A000-memory.dmp family_zgrat_v1 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\371b336da91abd01bf0522c7cbf47934.exe"C:\Users\Admin\AppData\Local\Temp\371b336da91abd01bf0522c7cbf47934.exe"1⤵PID:1648
-
C:\Users\Admin\AppData\Local\Origin\Install\Setup\Battlefield4\ErrorAssistant\Sys.pif"C:\Users\Admin\AppData\Local\Origin\Install\Setup\Battlefield4\ErrorAssistant\Sys.pif"2⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\Sys.pifC:\Users\Admin\AppData\Local\Temp\Sys.pif3⤵PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\Sys.pifC:\Users\Admin\AppData\Local\Temp\Sys.pif3⤵PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\Sys.pifC:\Users\Admin\AppData\Local\Temp\Sys.pif3⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\Sys.pifC:\Users\Admin\AppData\Local\Temp\Sys.pif3⤵PID:1256
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Rwxjsmgul.vbs"3⤵PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Origin\Install\Setup\Battlefield4\ErrorAssistant\BF4PureCracker0.exe"C:\Users\Admin\AppData\Local\Origin\Install\Setup\Battlefield4\ErrorAssistant\BF4PureCracker0.exe"2⤵PID:1860
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1088
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\NVIDIA\nvcontainer.exe'1⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD537700abece6ddcb9bcf94484df8eb623
SHA198d3f1e3374175ad67630af532883ed91575a7c3
SHA256d8c83004937e9db57de2e55410d08d17ad7bef0ba9f842eff118d5856f8fbb7c
SHA512a96cbd1892db067446b79a78f64f9a6df9107494cefe98108e740449f7bd5a6dac16622da2a1e675f77e885efd4447b3a9654ab2c292de5df286f1a49ed3a88d
-
Filesize
894KB
MD52f53b68f45cb8447631997d65803a47f
SHA17b9797289abec428ab7b51617ba4cd5df2c708ea
SHA256672399183a3adc21e02bf94a86a8e07ad7859c0157ce5b777fefd7f9e6a38b45
SHA512c4dda348c643a24025ff945dfd832029a60454671443511ae35a1baa5f19f3acb3478b147a6000960cd3bed669141929fe7f4feff8f00acc34808841d04221f1
-
Filesize
64KB
MD5259a6a86a4c42c25c34f9b6bd18177d5
SHA149e20fb7ca624408993229fd5a9e3babbe1013c1
SHA2565b2dfba36fac85ecf8a8418b039bd925b0a6e9892524f07973b262bd30df9078
SHA512999165e79f453309ce053d030d7f87b1f1c3203251e8056da6f2e618097d12aa88bb3de0bce5ab6b79ddc6cbee692fddf028420242ceabc7903b171e3f19cae1