Analysis
-
max time kernel
143s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 01:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
479de94fbadd83fce799ed3389da1ce5.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
479de94fbadd83fce799ed3389da1ce5.exe
-
Size
718KB
-
MD5
479de94fbadd83fce799ed3389da1ce5
-
SHA1
4ae4c57faeab4e3b4cbf07f34c0cb12f542bc422
-
SHA256
1c29ee414b011a411db774015a98a8970bf90c3475f91f7547a16a8946cd5a81
-
SHA512
ca9aa4a42e762c430713ead37dddba74f1dac806cdf9282c3a06a6632c2f0e3e22d5754c989fdd743fa5df0ae26bb99179faf08da3c1d5735d6bed7826842e0f
-
SSDEEP
12288:qlALj79bDcDn7T9mWM+QirAsLyjgeUhDlhcfK56bKIy6Sa5iWK21lm2NRm05g6F:WAvhDcDVMGrAsLmbtfdbOl8R9/
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/224-9-0x0000000006D20000-0x0000000006D98000-memory.dmp family_zgrat_v1 behavioral2/memory/224-10-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-11-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-13-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-15-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-17-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-19-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-21-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-23-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-25-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-27-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-29-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-31-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-33-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-35-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-37-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-39-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-41-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-43-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-45-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-47-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-49-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-51-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-53-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-55-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-57-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-59-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-61-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-63-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-65-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-67-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-69-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-71-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 behavioral2/memory/224-73-0x0000000006D20000-0x0000000006D93000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 224 479de94fbadd83fce799ed3389da1ce5.exe