Analysis
-
max time kernel
1s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
537d313f3dfe75d7a9d4f36f80cce049.exe
Resource
win7-20231129-en
General
-
Target
537d313f3dfe75d7a9d4f36f80cce049.exe
-
Size
1.8MB
-
MD5
537d313f3dfe75d7a9d4f36f80cce049
-
SHA1
a9d34d4ef62afbeed8f74c18c212e2c1d4c3f7cb
-
SHA256
6d7fac5d7bfe833eb0756a174ceb9ea8280cd3f9858215924284af1b559bd81f
-
SHA512
c4b698a6058f935c1db07ac92ae5e39a2e90f9e07d536ab2b6045ca539115bd1f5c7088f51d12a9edaab76befc41b0e8584a2cef4c1f906366d0a09687bbea9c
-
SSDEEP
49152:pAESWFubG04k1ImcRlJtquEwR/r28SJ4tIMBegTbV:MZGXk12nt5Fr28Sqt7UgTbV
Malware Config
Extracted
bitrat
1.38
eter102.dvrlists.com:3050
-
communication_password
fea0f7015af40ae69a386f06f28a8d31
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/2684-51-0x00000000060A0000-0x0000000006116000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-65-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-83-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-107-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-115-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-113-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-111-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-109-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-105-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-103-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-101-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-99-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-97-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-95-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-93-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-91-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-89-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-87-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-85-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-81-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-79-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-77-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-75-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-73-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-71-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-69-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-67-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-63-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-61-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-59-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-57-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-55-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-53-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 behavioral2/memory/2684-52-0x00000000060A0000-0x0000000006110000-memory.dmp family_zgrat_v1 -
resource yara_rule behavioral2/memory/3244-2387-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\537d313f3dfe75d7a9d4f36f80cce049.exe"C:\Users\Admin\AppData\Local\Temp\537d313f3dfe75d7a9d4f36f80cce049.exe"1⤵PID:2684
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.82⤵PID:1576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.82⤵PID:952
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Kthavoimchnr.vbs"2⤵PID:1576
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\outlook.exe'3⤵PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\537d313f3dfe75d7a9d4f36f80cce049.exeC:\Users\Admin\AppData\Local\Temp\537d313f3dfe75d7a9d4f36f80cce049.exe2⤵PID:3244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50774a05ce5ee4c1af7097353c9296c62
SHA1658ff96b111c21c39d7ad5f510fb72f9762114bb
SHA256d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4
SHA512104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994