Analysis
-
max time kernel
144s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 15:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e0a9454706d547708bcdd77f838a195.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
3e0a9454706d547708bcdd77f838a195.exe
-
Size
242KB
-
MD5
3e0a9454706d547708bcdd77f838a195
-
SHA1
c153f3bfb3a795ccb49329dcc5ea66f875b97f7a
-
SHA256
d4f98966e21cbaf4907dd75b432c82fd885bb21f4959d2a8d9968a9b993d6425
-
SHA512
b5d4817e8a5155a55af0f015cd5beca47f9ee16f44b53858d028b9ea492c9952344ba1af9c1715b56412b32e1108dc200a1f1c54ff25f3ceba3b1f5d51587bdf
-
SSDEEP
6144:HDKW1Lgbdl0TBBvjc/MnpLz1q2eFjxFp3LCANsVKg/:jh1Lk70TnvjcCFpq2eFdTLvg/
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral2/memory/3896-0-0x0000000004A90000-0x0000000004AD2000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-6-0x0000000005140000-0x0000000005180000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-20-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-50-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-70-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-68-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-66-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-64-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-62-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-60-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-58-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-56-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-54-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-52-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-48-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-46-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-44-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-42-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-40-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-38-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-36-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-34-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-32-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-30-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-28-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-26-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-24-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-22-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-18-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-16-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-14-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-12-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-10-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-8-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 behavioral2/memory/3896-7-0x0000000005140000-0x000000000517A000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3896 3e0a9454706d547708bcdd77f838a195.exe