Analysis

  • max time kernel
    166s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 20:34

General

  • Target

    e065974b0db0079fcc57cf5d209fa267c852772a58a68cee307a72c91d382a8e.exe

  • Size

    3.7MB

  • MD5

    d3c4575e325d9b2ea4375be6ae184469

  • SHA1

    dba82c40924a219234c29c7ab7d6da4e715c8aa2

  • SHA256

    e065974b0db0079fcc57cf5d209fa267c852772a58a68cee307a72c91d382a8e

  • SHA512

    75d19580269523c1eedbcf3079c6bd15dd4848d212e81028af1a7363927153451b3d579dd5f158df787edd246a9fcc18f7b48d67629e8f120bdd998d6641ef7d

  • SSDEEP

    98304:723bBil+7+NRBY2V9sJg2E65NEOzobiP8Xlb46LqpGVP:70BioqNbY2nsJg2E6Npzobi0Xlb462

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e065974b0db0079fcc57cf5d209fa267c852772a58a68cee307a72c91d382a8e.exe
    "C:\Users\Admin\AppData\Local\Temp\e065974b0db0079fcc57cf5d209fa267c852772a58a68cee307a72c91d382a8e.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nnH5laKXwK.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:936
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:4996
          • C:\Recovery\WindowsRE\fontdrvhost.exe
            "C:\Recovery\WindowsRE\fontdrvhost.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2176

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\nnH5laKXwK.bat

              Filesize

              213B

              MD5

              6c5ea8caea3f70f906c4db8a8af6998a

              SHA1

              8e74dc1e221b656813c6ba1536557a8db144fd83

              SHA256

              4506322d2ac5a410c3cfff9ef31ac942402aedf43bb7a52fd66b0794be2d5ac2

              SHA512

              70e3e7b7cd52f2d08d5f2bdeafdad2717756c9e93403e7f8b51bddca8655bd91840316206d25dd2fbb26748f4071a69ed4af17319143edfc2c051210adba0620

            • C:\Users\Default\wininit.exe

              Filesize

              3.7MB

              MD5

              d3c4575e325d9b2ea4375be6ae184469

              SHA1

              dba82c40924a219234c29c7ab7d6da4e715c8aa2

              SHA256

              e065974b0db0079fcc57cf5d209fa267c852772a58a68cee307a72c91d382a8e

              SHA512

              75d19580269523c1eedbcf3079c6bd15dd4848d212e81028af1a7363927153451b3d579dd5f158df787edd246a9fcc18f7b48d67629e8f120bdd998d6641ef7d

            • memory/2176-181-0x000000001DD10000-0x000000001DE25000-memory.dmp

              Filesize

              1.1MB

            • memory/3120-0-0x0000000000340000-0x00000000006FA000-memory.dmp

              Filesize

              3.7MB

            • memory/3120-1-0x00007FF9121C0000-0x00007FF912C81000-memory.dmp

              Filesize

              10.8MB

            • memory/3120-3-0x000000001B430000-0x000000001B440000-memory.dmp

              Filesize

              64KB

            • memory/3120-2-0x0000000000E80000-0x0000000000E81000-memory.dmp

              Filesize

              4KB

            • memory/3120-4-0x000000001B430000-0x000000001B440000-memory.dmp

              Filesize

              64KB

            • memory/3120-5-0x00007FF9121C0000-0x00007FF912C81000-memory.dmp

              Filesize

              10.8MB

            • memory/3120-6-0x00007FF930410000-0x00007FF9304CE000-memory.dmp

              Filesize

              760KB

            • memory/3120-9-0x00007FF930220000-0x00007FF930221000-memory.dmp

              Filesize

              4KB

            • memory/3120-8-0x0000000002850000-0x0000000002876000-memory.dmp

              Filesize

              152KB

            • memory/3120-10-0x000000001B430000-0x000000001B440000-memory.dmp

              Filesize

              64KB

            • memory/3120-11-0x00007FF930210000-0x00007FF930211000-memory.dmp

              Filesize

              4KB

            • memory/3120-13-0x0000000000EC0000-0x0000000000ECE000-memory.dmp

              Filesize

              56KB

            • memory/3120-14-0x00007FF930200000-0x00007FF930201000-memory.dmp

              Filesize

              4KB

            • memory/3120-16-0x0000000002880000-0x000000000289C000-memory.dmp

              Filesize

              112KB

            • memory/3120-17-0x000000001C920000-0x000000001C970000-memory.dmp

              Filesize

              320KB

            • memory/3120-18-0x000000001B430000-0x000000001B440000-memory.dmp

              Filesize

              64KB

            • memory/3120-19-0x00007FF9301F0000-0x00007FF9301F1000-memory.dmp

              Filesize

              4KB

            • memory/3120-21-0x0000000001070000-0x0000000001080000-memory.dmp

              Filesize

              64KB

            • memory/3120-22-0x00007FF9301E0000-0x00007FF9301E1000-memory.dmp

              Filesize

              4KB

            • memory/3120-24-0x00000000028A0000-0x00000000028B8000-memory.dmp

              Filesize

              96KB

            • memory/3120-25-0x00007FF930410000-0x00007FF9304CE000-memory.dmp

              Filesize

              760KB

            • memory/3120-26-0x00007FF9301D0000-0x00007FF9301D1000-memory.dmp

              Filesize

              4KB

            • memory/3120-28-0x0000000001080000-0x0000000001090000-memory.dmp

              Filesize

              64KB

            • memory/3120-29-0x00007FF9301C0000-0x00007FF9301C1000-memory.dmp

              Filesize

              4KB

            • memory/3120-31-0x0000000001090000-0x00000000010A0000-memory.dmp

              Filesize

              64KB

            • memory/3120-32-0x00007FF9301B0000-0x00007FF9301B1000-memory.dmp

              Filesize

              4KB

            • memory/3120-34-0x00000000028C0000-0x00000000028CE000-memory.dmp

              Filesize

              56KB

            • memory/3120-35-0x00007FF9301A0000-0x00007FF9301A1000-memory.dmp

              Filesize

              4KB

            • memory/3120-37-0x00000000028D0000-0x00000000028DE000-memory.dmp

              Filesize

              56KB

            • memory/3120-40-0x00000000028E0000-0x00000000028EC000-memory.dmp

              Filesize

              48KB

            • memory/3120-38-0x00007FF930190000-0x00007FF930191000-memory.dmp

              Filesize

              4KB

            • memory/3120-41-0x00007FF930180000-0x00007FF930181000-memory.dmp

              Filesize

              4KB

            • memory/3120-43-0x00000000028F0000-0x00000000028FE000-memory.dmp

              Filesize

              56KB

            • memory/3120-44-0x00007FF930170000-0x00007FF930171000-memory.dmp

              Filesize

              4KB

            • memory/3120-46-0x000000001B410000-0x000000001B422000-memory.dmp

              Filesize

              72KB

            • memory/3120-47-0x00007FF930160000-0x00007FF930161000-memory.dmp

              Filesize

              4KB

            • memory/3120-49-0x0000000002900000-0x000000000290C000-memory.dmp

              Filesize

              48KB

            • memory/3120-50-0x00007FF930150000-0x00007FF930151000-memory.dmp

              Filesize

              4KB

            • memory/3120-52-0x000000001B3F0000-0x000000001B400000-memory.dmp

              Filesize

              64KB

            • memory/3120-53-0x00007FF930140000-0x00007FF930141000-memory.dmp

              Filesize

              4KB

            • memory/3120-55-0x000000001C970000-0x000000001C986000-memory.dmp

              Filesize

              88KB

            • memory/3120-56-0x00007FF930130000-0x00007FF930131000-memory.dmp

              Filesize

              4KB

            • memory/3120-58-0x000000001C990000-0x000000001C9A2000-memory.dmp

              Filesize

              72KB

            • memory/3120-59-0x000000001CEE0000-0x000000001D408000-memory.dmp

              Filesize

              5.2MB

            • memory/3120-60-0x00007FF930120000-0x00007FF930121000-memory.dmp

              Filesize

              4KB

            • memory/3120-62-0x000000001B2F0000-0x000000001B2FE000-memory.dmp

              Filesize

              56KB

            • memory/3120-64-0x000000001B300000-0x000000001B30C000-memory.dmp

              Filesize

              48KB

            • memory/3120-65-0x00007FF930110000-0x00007FF930111000-memory.dmp

              Filesize

              4KB

            • memory/3120-66-0x00007FF930100000-0x00007FF930101000-memory.dmp

              Filesize

              4KB

            • memory/3120-68-0x000000001B310000-0x000000001B320000-memory.dmp

              Filesize

              64KB

            • memory/3120-69-0x00007FF9300F0000-0x00007FF9300F1000-memory.dmp

              Filesize

              4KB

            • memory/3120-71-0x000000001B320000-0x000000001B330000-memory.dmp

              Filesize

              64KB

            • memory/3120-72-0x00007FF9300E0000-0x00007FF9300E1000-memory.dmp

              Filesize

              4KB

            • memory/3120-74-0x000000001B390000-0x000000001B3EA000-memory.dmp

              Filesize

              360KB

            • memory/3120-76-0x000000001B330000-0x000000001B33E000-memory.dmp

              Filesize

              56KB

            • memory/3120-77-0x00007FF9300D0000-0x00007FF9300D1000-memory.dmp

              Filesize

              4KB

            • memory/3120-78-0x00007FF9300C0000-0x00007FF9300C1000-memory.dmp

              Filesize

              4KB

            • memory/3120-80-0x000000001B340000-0x000000001B350000-memory.dmp

              Filesize

              64KB

            • memory/3120-81-0x00007FF9300B0000-0x00007FF9300B1000-memory.dmp

              Filesize

              4KB

            • memory/3120-83-0x000000001B350000-0x000000001B35E000-memory.dmp

              Filesize

              56KB

            • memory/3120-84-0x00007FF9300A0000-0x00007FF9300A1000-memory.dmp

              Filesize

              4KB

            • memory/3120-86-0x000000001B440000-0x000000001B458000-memory.dmp

              Filesize

              96KB

            • memory/3120-87-0x00007FF930090000-0x00007FF930091000-memory.dmp

              Filesize

              4KB

            • memory/3120-89-0x000000001B360000-0x000000001B36C000-memory.dmp

              Filesize

              48KB