Analysis

  • max time kernel
    143s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2024 15:11

General

  • Target

    3e0a9454706d547708bcdd77f838a195.exe

  • Size

    242KB

  • MD5

    3e0a9454706d547708bcdd77f838a195

  • SHA1

    c153f3bfb3a795ccb49329dcc5ea66f875b97f7a

  • SHA256

    d4f98966e21cbaf4907dd75b432c82fd885bb21f4959d2a8d9968a9b993d6425

  • SHA512

    b5d4817e8a5155a55af0f015cd5beca47f9ee16f44b53858d028b9ea492c9952344ba1af9c1715b56412b32e1108dc200a1f1c54ff25f3ceba3b1f5d51587bdf

  • SSDEEP

    6144:HDKW1Lgbdl0TBBvjc/MnpLz1q2eFjxFp3LCANsVKg/:jh1Lk70TnvjcCFpq2eFdTLvg/

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 38 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e0a9454706d547708bcdd77f838a195.exe
    "C:\Users\Admin\AppData\Local\Temp\3e0a9454706d547708bcdd77f838a195.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-0-0x0000000074D40000-0x000000007542E000-memory.dmp

    Filesize

    6.9MB

  • memory/1648-2-0x0000000000490000-0x00000000004D2000-memory.dmp

    Filesize

    264KB

  • memory/1648-3-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB

  • memory/1648-4-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB

  • memory/1648-1-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB

  • memory/1648-5-0x0000000002010000-0x0000000002050000-memory.dmp

    Filesize

    256KB

  • memory/1648-6-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-17-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-39-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-49-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-69-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-67-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-65-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-63-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-61-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-59-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-57-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-55-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-53-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-51-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-47-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-45-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-43-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-41-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-37-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-502-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB

  • memory/1648-35-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-33-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-31-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-29-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-27-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-25-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-23-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-21-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-19-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-15-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-13-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-11-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-9-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-7-0x0000000002010000-0x000000000204A000-memory.dmp

    Filesize

    232KB

  • memory/1648-503-0x0000000074D40000-0x000000007542E000-memory.dmp

    Filesize

    6.9MB

  • memory/1648-504-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB

  • memory/1648-505-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB