Analysis

  • max time kernel
    598s
  • max time network
    598s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 14:06

General

  • Target

    53d5c2574c7f70b7aa69243916acf6e43fe4258fbd015660032784e150b3b4fa.exe

  • Size

    1.4MB

  • MD5

    0d61d50067eb93ae9ce049be387ae4e2

  • SHA1

    8fff0a09cb0cfd332d38d421d2debfc4408686c5

  • SHA256

    53d5c2574c7f70b7aa69243916acf6e43fe4258fbd015660032784e150b3b4fa

  • SHA512

    d0bfadfc2d002c8ce274d5e5143e1c9a2b9ed6df1c3188607a2dd408c375bf31af58a7a0b2b9793dbbbd99d44843f00465947237e95f9ab22cf49a0847f86a22

  • SSDEEP

    24576:a7KmUvqfA6xLd/G9QfCRnGRAm/TaHAl/Y9+vbzC0heKaSGXAsLkv:WK7qfw9Q6QHaHAl/Y9wbuRKLkLQ

Malware Config

Signatures

  • Detect ZGRat V2 1 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Looks up external IP address via web service 64 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53d5c2574c7f70b7aa69243916acf6e43fe4258fbd015660032784e150b3b4fa.exe
    "C:\Users\Admin\AppData\Local\Temp\53d5c2574c7f70b7aa69243916acf6e43fe4258fbd015660032784e150b3b4fa.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\25078BFBFF000306D2F88CC642PZTw1\4.jpeg

    Filesize

    64KB

    MD5

    b66c6135e77ecd6b1a0c2207ce7c8111

    SHA1

    ea07c13f1e4fabc1d7dbb9b6ecf48360806f7f36

    SHA256

    be8c28546f9dd05f945f9aa364b370a01e32a1f35d168161d383870662c2d226

    SHA512

    b8e27f519c53c1a2dd904b74fca27da94a675fe767791bc0893dff4c1faea30b1037014fd694b28a6a43eadadd1232ef6fd0224cc0cb92b93161ba14232ad08d

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Clipboard.txt

    Filesize

    56B

    MD5

    6a62b6c08be34b5cf03bdd09ab93af13

    SHA1

    4ef6885304c05dd230a65121c21f547fdaa65c50

    SHA256

    1d3a06ca4feed11eff3b24b8fd6cfa35a904c0e7133f0a8922032e6eabb6cbb3

    SHA512

    881199acf86264dab873160dbf1452474f744aea00393b868b2080462fba5d095e1bae70c1d8db1dc77b03a8249866d47199628cd291592464f88ded187e1774

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\EmailClients\Outlook\Outlook.txt

    Filesize

    2B

    MD5

    81051bcc2cf1bedf378224b0a93e2877

    SHA1

    ba8ab5a0280b953aa97435ff8946cbcbb2755a27

    SHA256

    7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

    SHA512

    1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\ApproveUnblock.ps1

    Filesize

    958KB

    MD5

    39b2e95526d6f7810af3e464d290b5b9

    SHA1

    fcec5157d0aa8aafa97fc548ba3a80fe4da87ac2

    SHA256

    909ad7ca7eb85b51d91c6b315992bb7f85066d77c39afc827c4ccfe6d7a8d117

    SHA512

    2d01c58238e761d0fe1d1f1d4dda856357a2d4e48f49c1fe2398f46a88a6bada9e8cbf88a589d8304283b1b2c56259b8e8403d4e3a491a8dd95e30c72e7d6ee2

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\CheckpointOut.cmd

    Filesize

    796KB

    MD5

    7ad89d380577fa37958f65232dcc918c

    SHA1

    3d0897bc1bb2ff07f40d8bc1942dd02fa0a13171

    SHA256

    23f9b4fdefc54b8ab2a237c1b626d1ad18aeb415fdce14892ef230239256ffb5

    SHA512

    16278784a75e32fb607281d6cd86ca032e412159d3ea05f251ab1ab4bd16059872cc5b590681c0c7e8d99c78d2c241d3ed3f2805bbbca75415f0645dd820b15c

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\CloseWatch.dll

    Filesize

    828KB

    MD5

    cefe14757eb6b5c96e6d671db0057f8e

    SHA1

    de12bc86c28aab811ae862e4eb0b9d2b1bddb146

    SHA256

    6f8f6f437dbe7a6836043218d6f786799cd7c784569158ac9cfd8fda3844395e

    SHA512

    6213a4038eb37c09cb35076dfe461095bbbd7cd01a7eb7596bb2c9de4b38ff90659194b3f4042ac187bb3dd3f75364d08c91d421b0cf60fcfdb35a7ae6459933

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\DenyApprove.snd

    Filesize

    926KB

    MD5

    623461114e14727c715309269ff0d943

    SHA1

    54dd8e01b838acd4ed5266b5882b775d60f6254e

    SHA256

    1d068b45e4d7d43ed6c14ca9fdc221936d0b201c9955714e955c9c5950b4a621

    SHA512

    c4b9a3732c7eac8b8484add0ed427ac693ee77e24b5b7da8c6c75236deba704c1f8539e405e4cda20d30379da44c494ba1de7d3dcfd051c393639c25e477f6ec

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\DenyConfirm.mp4

    Filesize

    373KB

    MD5

    b2733c8bb2524af2d30740812c632b60

    SHA1

    748c9e4412016cbb11867d367a12bac582a257c4

    SHA256

    c5a12af1bd013eff9051a65315a3dad57bd879b3e17ef5cee434c722ec13dda7

    SHA512

    76abd502537d67cfb8e07035724265b51b2a918de4ccf99b9863caba8b31ba789683bf1d34d022eb3af44fde9e83d990e2de203363ff89a83fee9728050d8ccf

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\DismountConvert.mov

    Filesize

    763KB

    MD5

    77c2406b4e4df8cc6bb75b6e1af3e17b

    SHA1

    1a1557d94229a9ae860405f14cc82731b72105a4

    SHA256

    ef26e2531172d3e0aa2dbf5aa3a4b8fbd641680e4339a1a9c02b0f3d9403f3fd

    SHA512

    301d731a1778d093f5c718e06f1065b451ab5ee383d62fb1f7ffb08a053335124ecf4d503a3a0d1ec087f715a10f9143aa76652f43049d665af5f00af3e4bf36

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\EditRegister.mht

    Filesize

    503KB

    MD5

    15fafa4a687981bf98e84945171aa13a

    SHA1

    1831edd8a0e28a79f219ce0524328f943b4621d7

    SHA256

    34d5e16c75de19bec8ca4214887fd345e4f58b6237a6d66ab116100d06304d1f

    SHA512

    ef76ec6aebb195afb006182458abf01a5065518a337b5d3e9e386e93f2b43796e3a1bf5bfa0bb5729e7a5686a9f4d3ed773c8f61577fd41f9d596e21d35357f3

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\ExpandDisable.raw

    Filesize

    893KB

    MD5

    22e09a8e5a31f25b4c04b1339392774b

    SHA1

    d1f2416f80e80934a147c5e8be0a6a608bec3998

    SHA256

    5634bf1af940fb3ac5a612f1a50cbb8611abc922b9cf0a9091455c2ec99acdd9

    SHA512

    fa69c56d9b082c81af1953c316e1288c98bd492b6d2eec420eb9561d540613fdd36c609263fa3cb46e0a114c18ecbd0494a933735bdd2046303610254767ef9d

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\GroupInstall.3gp

    Filesize

    633KB

    MD5

    4279c5ab3dd1c77b0b896d14c8a1ecbd

    SHA1

    b114c47acaa99903f4b9320f530ead53d7afaf2b

    SHA256

    8abdc7d406facec3f85150aa740d6dae9dc6b952b4e2d2a8d51326f0fccdcb75

    SHA512

    b2f53f75cebc21194425e479fed91e1dc399fdaf7cf37ac91d4cb868009c501a7d244b7ff8e0e30e4ab22d25786ac6dd43d012f44630b683418c5c7a85b106eb

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\GroupPing.dib

    Filesize

    601KB

    MD5

    aadd8fb74b71eeb013b44cef95773ea5

    SHA1

    a0ced2d1a46901acd065523026c14284062ce366

    SHA256

    e21715668dae2e8023cc5791e93477d3d3920d97e32d4d298b455f3515c31c75

    SHA512

    47f1d9e3ebc4f4a9c48878aa785cf8fa74dd39ecd20a23a4452583c7bdeaa45cc327c46d7a1f73d0384d0b69ec759f6e837040cf819cbbb200edc9b14854cf14

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\ImportCheckpoint.au

    Filesize

    1.3MB

    MD5

    218d01f79b72ee879680411d62090f3b

    SHA1

    c406b16e627a4819564b43b3678d065986a97396

    SHA256

    86cb763cbf0fe1f212137578988697e627007a48768874f8e9cc6381d6422c65

    SHA512

    b30f1a87b0d9876583f8a7eeae8571c0f3b57dcdd0ad0a5f7a971626abcdcbd6112aa1cc4ce45eb02918ba0f6138fa12d8d97d3d562054e4a1ab6768e51ce76e

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\ImportRepair.xltx

    Filesize

    386KB

    MD5

    30ef83bf09ff8b7c975983072386ffa5

    SHA1

    17f95e96d31e78f381d3ee14f8f592fa4eb8715e

    SHA256

    acd068b465f028af68aa1559926111002fb0c38dc17549d6a997ab6971a143c8

    SHA512

    11f2f4b7984832ec454969d3a5cdf41fb459aae667d9f89d36b3bbf81cc99d879370382d2119d441df01349d5f811ceda1d52bdd59565f33dd082d1aa9463e34

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\PingRepair.xltm

    Filesize

    568KB

    MD5

    edd26990529291a0f0a7e2bae62b8624

    SHA1

    02e68327289ff14f4768c96dc81e7023773dcb6d

    SHA256

    c522e0f53374731c477760b0ec476e5a95362e855be25b45f6d7b17ecca2780c

    SHA512

    7d5a8705981a7ca11f659977427f16700b50a92f01b31ea946daf176882203d43ac97631d9a3b6038590e67c23a098cdc4a8ee3670f2b9014a43c7fc3d89cb11

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\ProtectEdit.rmi

    Filesize

    471KB

    MD5

    9dfded2ceb70a9e6029ec99a63a808fb

    SHA1

    462c27eea9d10d401bca82fec7fcfd026ebb0d71

    SHA256

    d5e55c7a543ee62b7b362d0d32687f13c559fb034f2279da22876fa0fa4e11a5

    SHA512

    23d7980fb27edff3e50b79566b62fee1c04b2407957c7ba1653bc1f29ea377af6ce0565600f3ae43c51663acd378d387cdd53a473f32e309acc39156f52eb0d9

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\ProtectWatch.emz

    Filesize

    341KB

    MD5

    c465d2921af81c0d342602aab456ab34

    SHA1

    3d0c61af40fa629b4dc05ddbe610d5bf6e883965

    SHA256

    ced8f1d0b2a38c51280bf9dcae7ddf8a45db960ab06c34daeee866f055e948cd

    SHA512

    5738b33d2b5cdb5aa664cc04e02fafda00897fa3a9caac6b5ca2f1197ad1bc79fa2f59cd1d6e3c516816f9b740aaeaea78c6726c66daa34f89834bd186cab631

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\ResetSubmit.inf

    Filesize

    666KB

    MD5

    866865254fa5e5beddd82bbc29a75d12

    SHA1

    3e44ca4d574bcd3fb4901489929be08856162e2f

    SHA256

    3dfa701dacbaa6f554051d700644fef91ad1607dfe122a77c9e4065ece110892

    SHA512

    6a1f88bfec71af1480a277fa9e0d5c9174bc92e2af4de50610c304169a38d2979b90c8387856ea7148b9bc33bf6cbf6b688c61ed7da219253df07a1d7591e272

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\SendMeasure.mpv2

    Filesize

    861KB

    MD5

    521b812ad9c25bf17216990be9f66811

    SHA1

    6a1b86e10726a64ceffb65ad2ffba500264d70c2

    SHA256

    cc1f35f8ee0f8394882aaf8dea4945f68e8c36acc87e1ac4be42153265a5966f

    SHA512

    3b0766f9a6f048b9824878fb59a00e6d1306170055a39ab39c5e7e5a543139969a066d6325c7d75d970f05e3ae5690555184502a571270acfc34ef32f5992ac1

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\SubmitComplete.aiff

    Filesize

    536KB

    MD5

    7ced5ec14785ddb1c7915d5da3bdfef6

    SHA1

    cdbb1347e642d00a1b7ec8dca1d552eb8a393605

    SHA256

    03145f0716c0f59d275f43a72ea123417baef4b23d482b37b830c2f56b8572ed

    SHA512

    614521cd7c9e724694620dee10da2ae6b913e12302a55199a10a63b4203dcf67c471ed2bf24f8e4c08770e9fea93023d63742d941993e8ce49b701ca162624cc

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\SwitchBlock.ADTS

    Filesize

    381KB

    MD5

    d3546e14f8573153793e977c171c2abb

    SHA1

    43ec43d0e3fecb6588af143474117e3f45cf05d3

    SHA256

    ea94159ce83ed1049e81478e2cd58b68adc32663548f241316c70ca53fcb0236

    SHA512

    25b94e11280ca5d59c4b34104eeb16214c06da8c001c11623c21d23b434aade63cfd6a153862ba8659c66b4343b91955a051255c233a0e5c5ef04d48f5eee615

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\UninstallWait.mpeg3

    Filesize

    92KB

    MD5

    0e8e1728a106a85658b76a5d0e2f8125

    SHA1

    ecbdea07c14a0de2b87ccd705ac8fae7c533d9e1

    SHA256

    42acaf72e2e7bc61cefabe9396f57692f375ac43e8c553b447e79ff447199786

    SHA512

    38d0dbc8db3cced2679ebea7c484412a63c0342d30a8fa8e20e9ec7b181e3486327e07863b0826f2c4fa11cbfdfb944f344c148da98ea952e073b65ee0831336

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Files\UseConvertTo.bmp

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Info.txt

    Filesize

    372B

    MD5

    6bd63601bf80e6180388591e51408774

    SHA1

    f5b44a7868354a679729638b2e29bfbe2ec6f7c4

    SHA256

    67d8e22134e2d2604ebabf78845e62866c3bbed6d04a1f753d8b2432b512a68e

    SHA512

    005b319e4d04336a164ca689a1efdc18f2d440c76c85ecd02e8b041aa141ada84cd192d79164826298ecf24e8c64afc0dd421a1b831cabce949db2fd139703f6

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Processes.txt

    Filesize

    283B

    MD5

    5cc0425391faaa3093391a9794c5cc70

    SHA1

    cb9131a40323eb08783166e1c6bbc91f79eb2145

    SHA256

    eac588603904eb7f58a7cb010c32fe6a1bd421c103d4e929d034b46f898d3ca0

    SHA512

    ea491d53086a2f2bf3cfda94425a1593bbafcd7dff5e04bb027c6824d6292c98b880a1799187af496fef4f66971b016456a11a784ed105d9ab58e4b197c2ea4d

  • C:\Users\Admin\AppData\Roaming\DJNDwDDN078BFBFF000306D2F88CC64239\25078BFBFF000306D2F88CC642PZTw\Programms.txt

    Filesize

    893B

    MD5

    4c0873f2172f682a32a885673460ad14

    SHA1

    122867f604535bc98a90bd9b12290863b66e79c3

    SHA256

    bd34455f68b6fe235a4bc2447b3f18fed09456063e85dfded9161c17735ce06d

    SHA512

    92fb9da4a34c9c95ba77b8f462c401f48008e2ccb59c1acfa01ade725e23c9b16259ac12d03394ed41232600df6b31d466b10f5f040fe73397dec8a724510495

  • memory/3028-4-0x000000001C6F0000-0x000000001C7D6000-memory.dmp

    Filesize

    920KB

  • memory/3028-0-0x0000000000350000-0x00000000004C6000-memory.dmp

    Filesize

    1.5MB

  • memory/3028-5-0x000000001A920000-0x000000001A996000-memory.dmp

    Filesize

    472KB

  • memory/3028-2-0x000000001AF10000-0x000000001AF90000-memory.dmp

    Filesize

    512KB

  • memory/3028-163-0x000007FEF53E0000-0x000007FEF5DCC000-memory.dmp

    Filesize

    9.9MB

  • memory/3028-164-0x000000001AF10000-0x000000001AF90000-memory.dmp

    Filesize

    512KB

  • memory/3028-1-0x000007FEF53E0000-0x000007FEF5DCC000-memory.dmp

    Filesize

    9.9MB