Analysis
-
max time kernel
24s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 06:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42faa54ab4183e9497c243e7543ac16f.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
General
-
Target
42faa54ab4183e9497c243e7543ac16f.exe
-
Size
371KB
-
MD5
42faa54ab4183e9497c243e7543ac16f
-
SHA1
89ac1eb6b7cf5e3c71966f9891b97e21a078f101
-
SHA256
a024f189799cced8d2b2b164f4cc73b0eb9e12784bc977f182175bb61c17a171
-
SHA512
8c4befdff6d72f78ef3fd0eaac34f9933bebd276f0d05863b301bc8199461ff6d7cd2ecf6eba7e1d4f1b1023613f164104c072effada5ced4a00138dbee481da
-
SSDEEP
6144:lTuY1NjS3LlNGyYePTDtVjSIbU2oCs8jvHtM/fifUfglQkg74PSn04ThflRHf2VF:lTVS3LloEPTDtYsZ3jPMiMga9OS04TrS
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral2/memory/1568-8-0x00000000078A0000-0x0000000007914000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-16-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-38-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-58-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-72-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-70-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-68-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-66-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-64-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-62-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-60-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-56-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-54-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-52-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-50-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-48-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-46-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-44-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-42-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-40-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-36-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-34-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-32-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-30-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-28-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-26-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-24-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-22-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-20-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-18-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-14-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-12-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-10-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1568-9-0x00000000078A0000-0x000000000790F000-memory.dmp family_zgrat_v1 behavioral2/memory/1516-2375-0x0000000000400000-0x000000000042C000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1568 42faa54ab4183e9497c243e7543ac16f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42faa54ab4183e9497c243e7543ac16f.exe"C:\Users\Admin\AppData\Local\Temp\42faa54ab4183e9497c243e7543ac16f.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵PID:1516
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Ayynslcijttpsmyqcwsffl.vbs"2⤵PID:1860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\dagke.exe'1⤵PID:4932