Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 11:44

General

  • Target

    New order.exe

  • Size

    2.7MB

  • MD5

    223a5478aa62bccf577bbe240cdd47d6

  • SHA1

    16c678d0837a434783e5d1e6194c5b3d29f2b044

  • SHA256

    f49a368529fcc6e6e9f1bc66b6254bda180d5d80189859d10116c9e5719eba1c

  • SHA512

    96244200041ccf3758d1b0389c8f8738973637cfa79835cadd6ba649b4949e194d7b1a61e9449a9c62bf1915d64db5da609c6cc67d34dc817c3e557d638ebabf

  • SSDEEP

    49152:4pUqG1bx+C/DJLTmxwM0SWUBHtsRnKTzKGold49d:4C/NmDvT8aclm9

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New order.exe
    "C:\Users\Admin\AppData\Local\Temp\New order.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\New order.exe
      "C:\Users\Admin\AppData\Local\Temp\New order.exe"
      2⤵
        PID:2240
      • C:\Users\Admin\AppData\Local\Temp\New order.exe
        "C:\Users\Admin\AppData\Local\Temp\New order.exe"
        2⤵
          PID:1560
        • C:\Users\Admin\AppData\Local\Temp\New order.exe
          "C:\Users\Admin\AppData\Local\Temp\New order.exe"
          2⤵
            PID:1040
          • C:\Users\Admin\AppData\Local\Temp\New order.exe
            "C:\Users\Admin\AppData\Local\Temp\New order.exe"
            2⤵
              PID:2744
            • C:\Users\Admin\AppData\Local\Temp\New order.exe
              "C:\Users\Admin\AppData\Local\Temp\New order.exe"
              2⤵
                PID:2068

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2240-953-0x000000001B1F0000-0x000000001B2FA000-memory.dmp

              Filesize

              1.0MB

            • memory/2240-952-0x000000001C220000-0x000000001C2A0000-memory.dmp

              Filesize

              512KB

            • memory/2240-950-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

              Filesize

              9.9MB

            • memory/2240-949-0x0000000000400000-0x00000000004E2000-memory.dmp

              Filesize

              904KB

            • memory/2240-3162-0x00000000004F0000-0x00000000004F8000-memory.dmp

              Filesize

              32KB

            • memory/2240-3165-0x000000001C220000-0x000000001C2A0000-memory.dmp

              Filesize

              512KB

            • memory/2240-3164-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

              Filesize

              9.9MB

            • memory/2240-3163-0x0000000000C80000-0x0000000000D1E000-memory.dmp

              Filesize

              632KB

            • memory/3048-62-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-50-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-6-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-8-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-14-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-12-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-18-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-32-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-30-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-34-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-28-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-38-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-48-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-56-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-54-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-52-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-4-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-64-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-66-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-60-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-58-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-3-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-46-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-44-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-42-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-40-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-36-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-26-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-24-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-22-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-20-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-16-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-10-0x000000001B6C0000-0x000000001B824000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-935-0x000000001BE00000-0x000000001BE80000-memory.dmp

              Filesize

              512KB

            • memory/3048-2-0x000000001B6C0000-0x000000001B82A000-memory.dmp

              Filesize

              1.4MB

            • memory/3048-1-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

              Filesize

              9.9MB

            • memory/3048-0-0x0000000000090000-0x000000000034E000-memory.dmp

              Filesize

              2.7MB

            • memory/3048-936-0x0000000000800000-0x0000000000801000-memory.dmp

              Filesize

              4KB

            • memory/3048-937-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

              Filesize

              9.9MB

            • memory/3048-938-0x000000001BC30000-0x000000001BD32000-memory.dmp

              Filesize

              1.0MB

            • memory/3048-939-0x0000000000810000-0x000000000085C000-memory.dmp

              Filesize

              304KB

            • memory/3048-951-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

              Filesize

              9.9MB