Analysis
-
max time kernel
0s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 19:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
371b336da91abd01bf0522c7cbf47934.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
371b336da91abd01bf0522c7cbf47934.exe
-
Size
2.9MB
-
MD5
371b336da91abd01bf0522c7cbf47934
-
SHA1
dca225e7018a9b628f2ae0998e6a01e7576751e4
-
SHA256
28952976aeedba181c346d3180d389d540c7a341b69e23d92529825820c4d06e
-
SHA512
52105ae02bab6066011e9bc9e4b06a2e79f90c92164974bc6508214c9234b04b29aeddc5715e73fe2fd93bc7b03644baf301f5e06c12243063e0361a56e55446
-
SSDEEP
49152:x6PaI2dBi0xNC76XQX5a+8kE3Qf+d1MqVhd+qnpWu1oEcBONXobPTTZy78kx0y2A:GaRB9xN46XQX5a+WQ2v+qnp9QO+rYItI
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
firewall.publicvm.com:25874
Attributes
-
communication_password
a20ba4fb329f7dc66c0dd3562e9f9984
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/3468-35-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-48-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-64-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-82-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-94-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-98-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-96-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-92-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-90-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-88-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-86-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-84-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-80-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-78-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-76-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-74-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-72-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-70-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-68-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-66-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-62-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-60-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-58-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-56-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-54-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-52-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-50-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-46-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-44-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-42-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-40-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-38-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-36-0x0000000005500000-0x000000000557A000-memory.dmp family_zgrat_v1 behavioral2/memory/3468-34-0x0000000005500000-0x0000000005580000-memory.dmp family_zgrat_v1 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\371b336da91abd01bf0522c7cbf47934.exe"C:\Users\Admin\AppData\Local\Temp\371b336da91abd01bf0522c7cbf47934.exe"1⤵PID:3980
-
C:\Users\Admin\AppData\Local\Origin\Install\Setup\Battlefield4\ErrorAssistant\Sys.pif"C:\Users\Admin\AppData\Local\Origin\Install\Setup\Battlefield4\ErrorAssistant\Sys.pif"2⤵PID:3468
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Rwxjsmgul.vbs"3⤵PID:1916
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\NVIDIA\nvcontainer.exe'4⤵PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Sys.pifC:\Users\Admin\AppData\Local\Temp\Sys.pif3⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\Sys.pifC:\Users\Admin\AppData\Local\Temp\Sys.pif3⤵PID:4148
-
-
-
C:\Users\Admin\AppData\Local\Origin\Install\Setup\Battlefield4\ErrorAssistant\BF4PureCracker0.exe"C:\Users\Admin\AppData\Local\Origin\Install\Setup\Battlefield4\ErrorAssistant\BF4PureCracker0.exe"2⤵PID:2324
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3368