Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2024 21:06

General

  • Target

    6b7ac85820cc4f0473db2dd738f64a95.exe

  • Size

    1.0MB

  • MD5

    6b7ac85820cc4f0473db2dd738f64a95

  • SHA1

    bc99b0d5a217d34bbfce0bf129ec1c6437a3bf93

  • SHA256

    c5ee34afbf493076223619be9b8019dd214f77c404227aadb0e0b0bc1fc71ce6

  • SHA512

    834acf63ed2e4f7c1df43ee2b6c060e508204c4bc4541dff44add91acf8e9b1c67b30e636524aeac504648f118085a5a8c44137af17bebc1e612847e03c554e5

  • SSDEEP

    12288:HACVEaXmJ0cp1EspJG+dRBz0s3y7K46HJ9Qv7FgpgmDa4NcbzTZG3GHQ:PyWmJ0cp1NJG+dRBxqa9QTFQNNc/9ZQ

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b7ac85820cc4f0473db2dd738f64a95.exe
    "C:\Users\Admin\AppData\Local\Temp\6b7ac85820cc4f0473db2dd738f64a95.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1388

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    316B

    MD5

    0bbf8e425dc32464be51f6afeafc43ac

    SHA1

    97ca72d51c4c98766ecaa511beba4eed30748359

    SHA256

    88b4669c10aaaeaeb64e38d04c7435a45f4d57e0e10fc23bfa4e9c134e6386b3

    SHA512

    df909b84f9cb81da2fe6e6e8f606cf2423863f4e4f1e63e6fc9aadb41b936019c810265684e07297e325ee2bbaf77ea303ba228feff25a13d8be6d61ba791e27

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    397B

    MD5

    89ace4c1edd876499a0e09e911639725

    SHA1

    8dad12e3f0bbe6dfb68dbaf478e6b7642cfe43fd

    SHA256

    fcdbe076a591ea303f2e04acfa6c6ffac8f4cd05c07ed6ccd78c9972c29cc7d3

    SHA512

    d18f40abb4702c2059b57cb4a0e71a2288e0d1738b126eb316e00ed5ec040df73aa09903bc354e543a551b4e12b5e2c50fd2992db54e5716b2eb98fc49f8b49c

  • memory/1388-0-0x00000000001D0000-0x00000000002DA000-memory.dmp
    Filesize

    1.0MB

  • memory/1388-1-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp
    Filesize

    9.9MB

  • memory/1388-2-0x00000000002F0000-0x0000000000370000-memory.dmp
    Filesize

    512KB

  • memory/1388-7-0x00000000002F0000-0x0000000000370000-memory.dmp
    Filesize

    512KB

  • memory/1388-35-0x00000000002F0000-0x0000000000370000-memory.dmp
    Filesize

    512KB

  • memory/1388-64-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp
    Filesize

    9.9MB