Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 12:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
file.exe
-
Size
6.3MB
-
MD5
e9e0213cb96b82d4ee974f2043bf1745
-
SHA1
42ee110653a66450cd2f1deba38252caab06cb6a
-
SHA256
5114522e3999f4c6757cfe457bcc0fa1263fccf2bcbf742a1fec0f6cc81e5aa6
-
SHA512
9d9d27da6e5d56f7068401b7f7db6a65367163605cd80fad42daf830c4e49a0c89f5e5fa92279775939a0aaf0de67fac0e4d8fc0e2dd4f659037cce7b77ac66a
-
SSDEEP
98304:btHcQ/qwOmDb6J9HRtk2AgiVfC3rx/TyoOO:btHcEqwOmDG9P7ViVfC313X
Malware Config
Signatures
-
Detect ZGRat V1 5 IoCs
resource yara_rule behavioral1/memory/2608-35-0x0000000000400000-0x0000000000456000-memory.dmp family_zgrat_v1 behavioral1/memory/2608-33-0x0000000000400000-0x0000000000456000-memory.dmp family_zgrat_v1 behavioral1/memory/2608-30-0x0000000000400000-0x0000000000456000-memory.dmp family_zgrat_v1 behavioral1/memory/2608-26-0x0000000000400000-0x0000000000456000-memory.dmp family_zgrat_v1 behavioral1/memory/2608-24-0x0000000000400000-0x0000000000456000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2252-1-0x0000000000380000-0x00000000009CE000-memory.dmp net_reactor -
Loads dropped DLL 1 IoCs
pid Process 2252 file.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 2608 2252 file.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2608 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2608 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28 PID 2252 wrote to memory of 2608 2252 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-