Analysis

  • max time kernel
    90s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2024 21:06

General

  • Target

    6b7ac85820cc4f0473db2dd738f64a95.exe

  • Size

    1.0MB

  • MD5

    6b7ac85820cc4f0473db2dd738f64a95

  • SHA1

    bc99b0d5a217d34bbfce0bf129ec1c6437a3bf93

  • SHA256

    c5ee34afbf493076223619be9b8019dd214f77c404227aadb0e0b0bc1fc71ce6

  • SHA512

    834acf63ed2e4f7c1df43ee2b6c060e508204c4bc4541dff44add91acf8e9b1c67b30e636524aeac504648f118085a5a8c44137af17bebc1e612847e03c554e5

  • SSDEEP

    12288:HACVEaXmJ0cp1EspJG+dRBz0s3y7K46HJ9Qv7FgpgmDa4NcbzTZG3GHQ:PyWmJ0cp1NJG+dRBxqa9QTFQNNc/9ZQ

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b7ac85820cc4f0473db2dd738f64a95.exe
    "C:\Users\Admin\AppData\Local\Temp\6b7ac85820cc4f0473db2dd738f64a95.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:684

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    1KB

    MD5

    dc4d4d123bcd1ecdd199a23786eeac46

    SHA1

    51aa755e71c81b1209e0fe80a492150390323a23

    SHA256

    bec6131a76e7e80d51d42f2e4379cb72152371db01c82e32e1263cb31fafa20a

    SHA512

    e73bdc175ec8987f6d986c68b4a71fc781f7085a916883ccd882934d91ab0c838dbbfeba9e82875cf44d2a9892e7c970e554d781399b4c8f361ad0ef51fc99ca

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    1KB

    MD5

    ae32fcd297e99715bc83be4f8adaf745

    SHA1

    bdf349c2e5007c2190c941ce588d9258a185a147

    SHA256

    86c02870e3024d1f455746a615896ccce7a0b2f59f9c91c8f24472fd95e6dacc

    SHA512

    c600e19fd13e6a4ad5b8bb57581c978b2130658cace5b0231dc70944c7f6806684542c44f0ac2492b8d706f5d6ca30cf04ddc96782ef8d18d7d6377272beb81c

  • memory/684-0-0x0000000000F10000-0x000000000101A000-memory.dmp
    Filesize

    1.0MB

  • memory/684-2-0x000000001BD70000-0x000000001BD80000-memory.dmp
    Filesize

    64KB

  • memory/684-1-0x00007FFCE3080000-0x00007FFCE3B41000-memory.dmp
    Filesize

    10.8MB

  • memory/684-33-0x000000001BD70000-0x000000001BD80000-memory.dmp
    Filesize

    64KB

  • memory/684-32-0x000000001BD70000-0x000000001BD80000-memory.dmp
    Filesize

    64KB

  • memory/684-128-0x00007FFCE3080000-0x00007FFCE3B41000-memory.dmp
    Filesize

    10.8MB