Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 22:33

General

  • Target

    011c45deea7f50338e56529fb8705caa6e86b3920e7f4f79926bcb7933ffa0ba.exe

  • Size

    99KB

  • MD5

    94c0ceb9bf2ba3ea4b60d67db728132c

  • SHA1

    1fa5ca6058e19602675076907748b08948495897

  • SHA256

    011c45deea7f50338e56529fb8705caa6e86b3920e7f4f79926bcb7933ffa0ba

  • SHA512

    2d5e24f01237875317272afec8c0fcfbbee5bf56532332f129345931f0c1444f84a0f0415cf72ce4872e90157c5229338b8fc7cff4404d60e68a1ff80a5aeb88

  • SSDEEP

    1536:TaRU9m4HYvSIX0u+7+j71+s5g2YEcIQ7/AzWOWuEdeHZMcziqU1ZyiL:BOhX0N7+f135dcIxWazScuqCMY

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\011c45deea7f50338e56529fb8705caa6e86b3920e7f4f79926bcb7933ffa0ba.exe
    "C:\Users\Admin\AppData\Local\Temp\011c45deea7f50338e56529fb8705caa6e86b3920e7f4f79926bcb7933ffa0ba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mouthcoordinate.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mouthcoordinate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mouthcoordinate.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mouthcoordinate.exe
        3⤵
        • Executes dropped EXE
        PID:1588
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mouthcoordinate.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mouthcoordinate.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3352
        • C:\Users\Admin\AppData\Local\temo_clean\client32.exe
          C:\Users\Admin\AppData\Local\temo_clean\client32.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:3420
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /sc ONLOGON /tn "temo_clean" /tr "C:\Users\Admin\AppData\Local\temo_clean\client32.exe" /RL HIGHEST
          4⤵
          • Creates scheduled task(s)
          PID:732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mouthcoordinate.exe

    Filesize

    18KB

    MD5

    57e3a39940a2e1c44beb4f9db2bff62a

    SHA1

    385322bc1caab1a92ee1309b3d1f8ed49fecce6b

    SHA256

    198487618c0a63e523213a3971209a22489c927e768cc6d7b9203ab89edde96d

    SHA512

    0c779f67baffe73a4505705abb90439667840a85b2af9a0008134cce58d9c0d1d635e4021e30fb188d2c442cb29f1ed52afc96aa0e4a912394c73c8f90e6ffe4

  • C:\Users\Admin\AppData\Local\temo_clean\PCICL32.DLL

    Filesize

    382KB

    MD5

    58b4be66a38037a265426c3f2b8ee6b1

    SHA1

    15f2ef08d83263e6bf446f861b710fa6f964d886

    SHA256

    1b43c858724e96d38289ba0a2d7de79edf9e5d22981e717e97027866880cf35a

    SHA512

    711590f09c03390c971679513836e0b44cf8100e59a4ce735822f5b4f01f6164bd63a7b888f076de348122c99c58f1ea1e9afa6e71a270bdcc0e83069dcc7a02

  • C:\Users\Admin\AppData\Local\temo_clean\PCICL32.dll

    Filesize

    662KB

    MD5

    bdebdc0f9f0dd28021ed0e4ae807b4b1

    SHA1

    596f6d02d61202abe452fdfe9f24d9845f46c5fa

    SHA256

    64da8e6543986bda8510358cde7ae6a8bc82e16090bf6bc5a6224a7236fd2d57

    SHA512

    4c7e32771143707c9d22bc29ab4802050aaed6604f94baa9ee96aa007329c1df0a2a051a9971ef75fbbf1f2d66208098b9406e0fd4904b5c4facd6802ded057f

  • C:\Users\Admin\AppData\Local\temo_clean\client32.exe

    Filesize

    117KB

    MD5

    a2b46c59f6e7e395d479b09464ecdba0

    SHA1

    92c132307dd21189b6d7912ddd934b50e50d1ec1

    SHA256

    89f0c8f170fe9ea28b1056517160e92e2d7d4e8aa81f4ed696932230413a6ce1

    SHA512

    4f4479ddcd9d0986aec3d789f9e14f9285e8d9d63a5b8f73c9e3203d3a53cd575b1e15edf0d5f640816bb7f25bd3501244e0f7c181a716a6804742ed2f1cf916

  • C:\Users\Admin\AppData\Local\temo_clean\pcicapi.dll

    Filesize

    32KB

    MD5

    dcde2248d19c778a41aa165866dd52d0

    SHA1

    7ec84be84fe23f0b0093b647538737e1f19ebb03

    SHA256

    9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

    SHA512

    c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

  • memory/2064-54-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-48-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-7-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/2064-8-0x00000000055B0000-0x000000000565A000-memory.dmp

    Filesize

    680KB

  • memory/2064-10-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-9-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-12-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-14-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-20-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-18-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-36-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-56-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-72-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-70-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-68-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-66-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-64-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-62-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-60-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-58-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-5-0x00000000003C0000-0x00000000003CA000-memory.dmp

    Filesize

    40KB

  • memory/2064-52-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-50-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-6-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/2064-46-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-44-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-42-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-40-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-38-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-34-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-32-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-30-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-28-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-26-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-24-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-22-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-16-0x00000000055B0000-0x0000000005653000-memory.dmp

    Filesize

    652KB

  • memory/2064-941-0x0000000005680000-0x0000000005681000-memory.dmp

    Filesize

    4KB

  • memory/2064-943-0x00000000059E0000-0x0000000005A2C000-memory.dmp

    Filesize

    304KB

  • memory/2064-942-0x0000000005860000-0x00000000058A0000-memory.dmp

    Filesize

    256KB

  • memory/2064-944-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/2064-945-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/2064-946-0x0000000006110000-0x00000000066B4000-memory.dmp

    Filesize

    5.6MB

  • memory/2064-953-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3352-954-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3352-983-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB