Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
42af7513c4f90b903faea61ef6f3730e.exe
Resource
win7-20231215-en
General
-
Target
42af7513c4f90b903faea61ef6f3730e.exe
-
Size
2.3MB
-
MD5
42af7513c4f90b903faea61ef6f3730e
-
SHA1
362f7f224e6a44efbd8111b73d3957ccbc8b6ad2
-
SHA256
e04b61d1ca799559e8e22b4df62e49c134934fad3e9efe55d7336d171e4009d7
-
SHA512
61e8827003371e6baee9ed6bdd30838314216358c8f9687e058f9ebe6f7a533af2858277dbf912d2a27f1aa9d106300e4267cf2a95a35bd21a233c9c5126c6bb
-
SSDEEP
49152:ZTrFrY0PuAPqmxJic7p24NLfweBFBz2fKwz/KqKW:Z3lZuAPqmxJJ784NLourkrzCB
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1992-175-0x00000000050E0000-0x0000000005152000-memory.dmp family_zgrat_v1 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2328 1992 42af7513c4f90b903faea61ef6f3730e.exe 24 PID 1992 wrote to memory of 2328 1992 42af7513c4f90b903faea61ef6f3730e.exe 24 PID 1992 wrote to memory of 2328 1992 42af7513c4f90b903faea61ef6f3730e.exe 24 PID 1992 wrote to memory of 2328 1992 42af7513c4f90b903faea61ef6f3730e.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe"C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2148
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:2276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:1668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵PID:112
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exeC:\Users\Admin\AppData\Local\Temp\42af7513c4f90b903faea61ef6f3730e.exe2⤵PID:992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LFRKQ2I9LTB8QBRMLIUY.temp
Filesize7KB
MD5f194a34d8debfa0823a215a37bc1d9f9
SHA174ff9592e37907cdab3f98f3a0ff1605f0b9e688
SHA2560969ecadde5434130e7e21d8185830cb6e4fdbd5c578590d595f2de61dd7ca94
SHA5124c0e4d0371472efa7135bce813f1f1b1f1704ae56057ab8c27f2a324fc1b846abdb04644260bf49bc80066200e2ea074955c24583d845701c99753e6e0b28849