Analysis
-
max time kernel
151s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 12:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
file.exe
-
Size
6.3MB
-
MD5
e9e0213cb96b82d4ee974f2043bf1745
-
SHA1
42ee110653a66450cd2f1deba38252caab06cb6a
-
SHA256
5114522e3999f4c6757cfe457bcc0fa1263fccf2bcbf742a1fec0f6cc81e5aa6
-
SHA512
9d9d27da6e5d56f7068401b7f7db6a65367163605cd80fad42daf830c4e49a0c89f5e5fa92279775939a0aaf0de67fac0e4d8fc0e2dd4f659037cce7b77ac66a
-
SSDEEP
98304:btHcQ/qwOmDb6J9HRtk2AgiVfC3rx/TyoOO:btHcEqwOmDG9P7ViVfC313X
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/3244-22-0x0000000000400000-0x0000000000456000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/5060-1-0x0000000000930000-0x0000000000F7E000-memory.dmp net_reactor -
Loads dropped DLL 1 IoCs
pid Process 5060 file.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5060 set thread context of 3244 5060 file.exe 103 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3244 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3244 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3244 5060 file.exe 103 PID 5060 wrote to memory of 3244 5060 file.exe 103 PID 5060 wrote to memory of 3244 5060 file.exe 103 PID 5060 wrote to memory of 3244 5060 file.exe 103 PID 5060 wrote to memory of 3244 5060 file.exe 103 PID 5060 wrote to memory of 3244 5060 file.exe 103 PID 5060 wrote to memory of 3244 5060 file.exe 103 PID 5060 wrote to memory of 3244 5060 file.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-