Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 06:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42faa54ab4183e9497c243e7543ac16f.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
General
-
Target
42faa54ab4183e9497c243e7543ac16f.exe
-
Size
371KB
-
MD5
42faa54ab4183e9497c243e7543ac16f
-
SHA1
89ac1eb6b7cf5e3c71966f9891b97e21a078f101
-
SHA256
a024f189799cced8d2b2b164f4cc73b0eb9e12784bc977f182175bb61c17a171
-
SHA512
8c4befdff6d72f78ef3fd0eaac34f9933bebd276f0d05863b301bc8199461ff6d7cd2ecf6eba7e1d4f1b1023613f164104c072effada5ced4a00138dbee481da
-
SSDEEP
6144:lTuY1NjS3LlNGyYePTDtVjSIbU2oCs8jvHtM/fifUfglQkg74PSn04ThflRHf2VF:lTVS3LloEPTDtYsZ3jPMiMga9OS04TrS
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/1668-4-0x00000000051A0000-0x0000000005214000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-28-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-62-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-68-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-66-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-64-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-60-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-58-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-56-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-54-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-52-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-50-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-48-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-46-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-44-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-42-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-40-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-38-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-36-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-34-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-32-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-30-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-26-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-24-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-22-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-20-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-18-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-16-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-14-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-12-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-10-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-8-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-6-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/1668-5-0x00000000051A0000-0x000000000520F000-memory.dmp family_zgrat_v1 behavioral1/memory/580-2383-0x0000000000400000-0x000000000042C000-memory.dmp family_zgrat_v1 -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\dagke.exe\"," 42faa54ab4183e9497c243e7543ac16f.exe -
Executes dropped EXE 1 IoCs
pid Process 580 RegAsm.exe -
Loads dropped DLL 2 IoCs
pid Process 1668 42faa54ab4183e9497c243e7543ac16f.exe 580 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1668 42faa54ab4183e9497c243e7543ac16f.exe 1668 42faa54ab4183e9497c243e7543ac16f.exe 1484 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1668 42faa54ab4183e9497c243e7543ac16f.exe Token: SeDebugPrivilege 1484 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1668 wrote to memory of 532 1668 42faa54ab4183e9497c243e7543ac16f.exe 30 PID 1668 wrote to memory of 532 1668 42faa54ab4183e9497c243e7543ac16f.exe 30 PID 1668 wrote to memory of 532 1668 42faa54ab4183e9497c243e7543ac16f.exe 30 PID 1668 wrote to memory of 532 1668 42faa54ab4183e9497c243e7543ac16f.exe 30 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 1668 wrote to memory of 580 1668 42faa54ab4183e9497c243e7543ac16f.exe 33 PID 532 wrote to memory of 1484 532 WScript.exe 32 PID 532 wrote to memory of 1484 532 WScript.exe 32 PID 532 wrote to memory of 1484 532 WScript.exe 32 PID 532 wrote to memory of 1484 532 WScript.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\42faa54ab4183e9497c243e7543ac16f.exe"C:\Users\Admin\AppData\Local\Temp\42faa54ab4183e9497c243e7543ac16f.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Ayynslcijttpsmyqcwsffl.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\dagke.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580
-