Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 00:15

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    2fadc3984b71f0fd08c832adeedf2b52

  • SHA1

    cc1fc06a55af72364fb0a1266d3f5936577162f9

  • SHA256

    34f47e63788cdb398c48ad06f3878ec9bce9fd0e261306b2c81b3796925f9240

  • SHA512

    63e8127e2d44cd98cd6225eb8d1f348f5e3e7d7f86900e2f949329f6d35a943147aa1fb72061a8868cfcd9e53fde536dc870b3a9c9248b6aab067774b1654685

  • SSDEEP

    24576:YRTpHFT/k5TFVLFvo56Ht4VPNA4/DSI4:yFyVLDN4VlA4/DSI4

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4020
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      C:\Users\Admin\AppData\Local\Temp\file.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log

    Filesize

    1KB

    MD5

    2b5b390f52a899f65331467743520372

    SHA1

    16540410c08d08e7efd401fe3cfef433aeb02827

    SHA256

    590c800671bf13265dbd56a999e03fd65c574f66e8ece5c4162dc8cabaa8668f

    SHA512

    e576e7edb251dc4736002c78ffde1b16b180618c657118d92a57e14a85b1bd57ff492be454c7225a9e3fd84c91d088f430e1ff403733a40a42ca3c8899885442

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1une1pyw.1dq.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3128-937-0x00000000056C0000-0x0000000005754000-memory.dmp

    Filesize

    592KB

  • memory/3128-989-0x00000000054B0000-0x00000000054C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-2-0x00000000054B0000-0x00000000054C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-3-0x00000000054C0000-0x00000000055BE000-memory.dmp

    Filesize

    1016KB

  • memory/3128-4-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-5-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-939-0x0000000005840000-0x00000000058D2000-memory.dmp

    Filesize

    584KB

  • memory/3128-15-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-19-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-21-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-17-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-23-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-13-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-25-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-1-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB

  • memory/3128-9-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-27-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-29-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-35-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-39-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-43-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-45-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-47-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-41-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-49-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-37-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-33-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-31-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-51-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-57-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-59-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-61-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-55-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-63-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-65-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-67-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-53-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-936-0x0000000002D40000-0x0000000002D41000-memory.dmp

    Filesize

    4KB

  • memory/3128-11-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-0-0x0000000000920000-0x0000000000A2A000-memory.dmp

    Filesize

    1.0MB

  • memory/3128-7-0x00000000054C0000-0x00000000055B8000-memory.dmp

    Filesize

    992KB

  • memory/3128-940-0x0000000005F30000-0x00000000064D4000-memory.dmp

    Filesize

    5.6MB

  • memory/3128-941-0x0000000005980000-0x00000000059E6000-memory.dmp

    Filesize

    408KB

  • memory/3128-988-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB

  • memory/3128-938-0x0000000005750000-0x000000000579C000-memory.dmp

    Filesize

    304KB

  • memory/3128-996-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB

  • memory/3572-995-0x0000000004F50000-0x0000000005024000-memory.dmp

    Filesize

    848KB

  • memory/3572-6573-0x0000000005070000-0x0000000005080000-memory.dmp

    Filesize

    64KB

  • memory/3572-5536-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB

  • memory/3572-994-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3572-1000-0x0000000005070000-0x0000000005080000-memory.dmp

    Filesize

    64KB

  • memory/3572-997-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB

  • memory/4020-959-0x0000000005C60000-0x0000000005C7E000-memory.dmp

    Filesize

    120KB

  • memory/4020-979-0x00000000071F0000-0x0000000007286000-memory.dmp

    Filesize

    600KB

  • memory/4020-977-0x0000000006F70000-0x0000000006F8A000-memory.dmp

    Filesize

    104KB

  • memory/4020-960-0x0000000005CB0000-0x0000000005CFC000-memory.dmp

    Filesize

    304KB

  • memory/4020-961-0x0000000002690000-0x00000000026A0000-memory.dmp

    Filesize

    64KB

  • memory/4020-962-0x000000007F440000-0x000000007F450000-memory.dmp

    Filesize

    64KB

  • memory/4020-963-0x0000000006230000-0x0000000006262000-memory.dmp

    Filesize

    200KB

  • memory/4020-964-0x00000000702A0000-0x00000000702EC000-memory.dmp

    Filesize

    304KB

  • memory/4020-974-0x0000000006270000-0x000000000628E000-memory.dmp

    Filesize

    120KB

  • memory/4020-942-0x00000000026A0000-0x00000000026D6000-memory.dmp

    Filesize

    216KB

  • memory/4020-976-0x00000000075B0000-0x0000000007C2A000-memory.dmp

    Filesize

    6.5MB

  • memory/4020-975-0x0000000006E40000-0x0000000006EE3000-memory.dmp

    Filesize

    652KB

  • memory/4020-978-0x0000000006FE0000-0x0000000006FEA000-memory.dmp

    Filesize

    40KB

  • memory/4020-958-0x0000000005740000-0x0000000005A94000-memory.dmp

    Filesize

    3.3MB

  • memory/4020-980-0x0000000007170000-0x0000000007181000-memory.dmp

    Filesize

    68KB

  • memory/4020-981-0x00000000071A0000-0x00000000071AE000-memory.dmp

    Filesize

    56KB

  • memory/4020-948-0x0000000005470000-0x00000000054D6000-memory.dmp

    Filesize

    408KB

  • memory/4020-947-0x00000000053D0000-0x00000000053F2000-memory.dmp

    Filesize

    136KB

  • memory/4020-946-0x0000000004DA0000-0x00000000053C8000-memory.dmp

    Filesize

    6.2MB

  • memory/4020-945-0x0000000002690000-0x00000000026A0000-memory.dmp

    Filesize

    64KB

  • memory/4020-944-0x0000000002690000-0x00000000026A0000-memory.dmp

    Filesize

    64KB

  • memory/4020-943-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB

  • memory/4020-982-0x00000000071B0000-0x00000000071C4000-memory.dmp

    Filesize

    80KB

  • memory/4020-983-0x00000000072B0000-0x00000000072CA000-memory.dmp

    Filesize

    104KB

  • memory/4020-984-0x0000000007290000-0x0000000007298000-memory.dmp

    Filesize

    32KB

  • memory/4020-987-0x0000000074EB0000-0x0000000075660000-memory.dmp

    Filesize

    7.7MB