Analysis
-
max time kernel
1574s -
max time network
1792s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 09:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dd2739067bfd088a6a1e5f7502105643.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
1800 seconds
General
-
Target
dd2739067bfd088a6a1e5f7502105643.exe
-
Size
721KB
-
MD5
dd2739067bfd088a6a1e5f7502105643
-
SHA1
819dd6a079abab8d34f85d9a1d06a0d556745fb7
-
SHA256
0b5b79893faa97f10737f52617ff8cdf0de0c0e064ae8303cd12eddf23ee2141
-
SHA512
b246edb5d53c1794dab80a6bbcb2997e47a5868e7ccb67accebaf3797413d66edd82a73aeb4444aadea8fcc7f9e0bc3c83ae806caf78e4f16db0c0688801f9ad
-
SSDEEP
12288:3izZBEP85HLKFLHOa8VnCTvy3PvoD5Xi0ztOTQHmO8eaktaLh/x2:S9BEP8RLKFLuPnCJln5OcHh8eaiC52
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/2288-11-0x0000000006B50000-0x0000000006BC0000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 2512 2288 dd2739067bfd088a6a1e5f7502105643.exe 102 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2512 dd2739067bfd088a6a1e5f7502105643.exe 2512 dd2739067bfd088a6a1e5f7502105643.exe 2512 dd2739067bfd088a6a1e5f7502105643.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2512 2288 dd2739067bfd088a6a1e5f7502105643.exe 102 PID 2288 wrote to memory of 2512 2288 dd2739067bfd088a6a1e5f7502105643.exe 102 PID 2288 wrote to memory of 2512 2288 dd2739067bfd088a6a1e5f7502105643.exe 102 PID 2288 wrote to memory of 2512 2288 dd2739067bfd088a6a1e5f7502105643.exe 102 PID 2288 wrote to memory of 2512 2288 dd2739067bfd088a6a1e5f7502105643.exe 102 PID 2288 wrote to memory of 2512 2288 dd2739067bfd088a6a1e5f7502105643.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd2739067bfd088a6a1e5f7502105643.exe"C:\Users\Admin\AppData\Local\Temp\dd2739067bfd088a6a1e5f7502105643.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\dd2739067bfd088a6a1e5f7502105643.exe"C:\Users\Admin\AppData\Local\Temp\dd2739067bfd088a6a1e5f7502105643.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-