Analysis
-
max time kernel
171s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 18:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3da00651de2aca0449afa220de5979fb.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
3da00651de2aca0449afa220de5979fb.exe
-
Size
636KB
-
MD5
3da00651de2aca0449afa220de5979fb
-
SHA1
26b2f295887722e744b557cc8cf43e86c20f2450
-
SHA256
30c4f5d3a9bc4ea1c8dd362095d5621bb50403b1a592b83ee3d9c3658bd7a8d1
-
SHA512
7fecc95338d87dad376ecb6ec5f1a121e3ad1e1a50753c760fb5314713b9d0182f99a07227306ee5e5f592776ec530974de43da74e65abf6ca5509fa92022f0b
-
SSDEEP
12288:/4mHFQm2BOUamTo4NchWmdi0MgOSP0kIb/WU5Nxk:jWxHamToHW10MbSPuWG
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/812-9-0x0000000007870000-0x00000000078DA000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 812 3da00651de2aca0449afa220de5979fb.exe