Analysis
-
max time kernel
3s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
458b61b6d0cc95c8b8f9efc039afdee0.exe
Resource
win7-20231215-en
General
-
Target
458b61b6d0cc95c8b8f9efc039afdee0.exe
-
Size
1.8MB
-
MD5
458b61b6d0cc95c8b8f9efc039afdee0
-
SHA1
2219421a1f46abddc293864cb672be6ac9fb5178
-
SHA256
12b9219af3987966cff3cb1922724f936db9057a21ec6f583ca61399ae082f13
-
SHA512
29c86526249f3cd2a84640038246026872dd5345c36b49dd9cd905cc03df898db8d61147e7997bbec6728b36f33c9cfdfb688c265e656c4d2ee99f35b93b93b4
-
SSDEEP
49152:oJdAMg7BSRxPlpfTuvecJNhVj3BdfaQWg167O:dz7WNpfTuZJNhZ3BdfaQnH
Malware Config
Signatures
-
Detect ZGRat V1 32 IoCs
Processes:
resource yara_rule behavioral2/memory/3584-144-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-154-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-164-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-170-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-178-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-190-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-198-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-196-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-194-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-192-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-188-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-186-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-184-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-182-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-180-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-176-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-174-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-172-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-168-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-166-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-162-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-160-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-158-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-156-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-152-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-150-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-148-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-146-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-142-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-140-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-138-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-137-0x00000000061B0000-0x000000000622B000-memory.dmp family_zgrat_v1 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
458b61b6d0cc95c8b8f9efc039afdee0.exepid process 852 458b61b6d0cc95c8b8f9efc039afdee0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\458b61b6d0cc95c8b8f9efc039afdee0.exe"C:\Users\Admin\AppData\Local\Temp\458b61b6d0cc95c8b8f9efc039afdee0.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:852 -
C:\ProgramData\Anyname.exe"C:\ProgramData\Anyname.exe"2⤵PID:1732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe3⤵PID:3692
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:1540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:4676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:3612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5a435c4300b641deb5b4a62b0619b7508
SHA1ba234df4d680129b8dd4276444c83bfce4601be2
SHA256ffb3ae06a4aa47f69021f2e56a3c4dde329ec5103694bbc849de7c1b7a1fe943
SHA5120ffafc60331152fe1bdac9775c2d4727bfced0233e1f8925a125c6bba33a8f5c879d62bbd36c3bb5cc500cf55b5f942197a23d0d93509a5ec86a357e40f3fe9b
-
Filesize
32KB
MD588781f6a985ca3a97a897aeecf704fc9
SHA1c27597226ea3f25e57623bc11d54df3ea2b055f6
SHA2569efd7c68a70a36b4ab8313f653009c0cca4e3768e29c41360eed55618f01fc15
SHA5129d4a5b6c4c15109492eb6750a947b72aa357d5d74038c1b2215a3976c77085b5dd4b7916c2a21f5d5420443cfa1accc45889d835c38041e0aeb7433230dd9649
-
Filesize
37KB
MD5f246b698ac69af03d5bd61fd22a83815
SHA1c0caadee0eb894ef0c55ad2a7bc17d58ad0c4c8e
SHA256eae30e75c8a87358c7104a3874c953a621bbb4e72ed6c88f67bf397d5d44b138
SHA5121046ef8141312113744edb0eab17c37c5d8fcd1883de39b178a1c4e27ebfe5e343ff64667e0dd23f4a5c241455340115e926232fda78c17785e280c383e094bf