Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 20:01 UTC

General

  • Target

    file.exe

  • Size

    2.0MB

  • MD5

    dade3d1f204511b49e65d585685a8b1f

  • SHA1

    a9fd8b917236353283aa812b225c3c161f82addd

  • SHA256

    3673fd28dc25cb26f8dad4aba5a280797cc5879e62bb064fa7d3e2bfb48b603b

  • SHA512

    3e1ca769a2e342608fb4c0d4c730bbaa58be08ae197c8a460fdd0b14e5540b17d5bde325fc746b161cd89c960655a830a68c368d3a0cc88fa8b24ce17f23778c

  • SSDEEP

    49152:jhm8pZbD1re5B1E8+/FB6UnBkBa1bpAm:VxDGl2Mdc1NAm

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAZgBpAGwAZQAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAZgBpAGwAZQAuAGUAeABlADsAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwAYwBsAGkAbgBlAHQALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAGMAbABpAG4AZQB0AC4AZQB4AGUA
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1968
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      C:\Users\Admin\AppData\Local\Temp\file.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2808

Network

    No results found
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56002
    file.exe
    152 B
    120 B
    3
    3
  • 64.52.171.220:56003
    file.exe
    52 B
    40 B
    1
    1
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-1-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-0-0x00000000009B0000-0x0000000000BB0000-memory.dmp

    Filesize

    2.0MB

  • memory/1932-2-0x0000000004CC0000-0x0000000004D00000-memory.dmp

    Filesize

    256KB

  • memory/1932-3-0x0000000004D00000-0x0000000004DFE000-memory.dmp

    Filesize

    1016KB

  • memory/1932-4-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-5-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-7-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-9-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-11-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-13-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-15-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-17-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-19-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-21-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-25-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-23-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-31-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-29-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-27-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-39-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-37-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-35-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-33-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-41-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-47-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-45-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-43-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-51-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-49-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-55-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-53-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-59-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-57-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-63-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-61-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-67-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-65-0x0000000004D00000-0x0000000004DF7000-memory.dmp

    Filesize

    988KB

  • memory/1932-936-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/1932-937-0x0000000004480000-0x0000000004514000-memory.dmp

    Filesize

    592KB

  • memory/1932-938-0x0000000002020000-0x000000000206C000-memory.dmp

    Filesize

    304KB

  • memory/1932-945-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-946-0x0000000004CC0000-0x0000000004D00000-memory.dmp

    Filesize

    256KB

  • memory/1932-965-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/1968-941-0x000000006FAF0000-0x000000007009B000-memory.dmp

    Filesize

    5.7MB

  • memory/1968-942-0x0000000002380000-0x00000000023C0000-memory.dmp

    Filesize

    256KB

  • memory/1968-943-0x0000000002380000-0x00000000023C0000-memory.dmp

    Filesize

    256KB

  • memory/1968-944-0x000000006FAF0000-0x000000007009B000-memory.dmp

    Filesize

    5.7MB

  • memory/2808-964-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/2808-963-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2808-966-0x0000000004C80000-0x0000000004CC0000-memory.dmp

    Filesize

    256KB

  • memory/2808-967-0x00000000008D0000-0x00000000009A6000-memory.dmp

    Filesize

    856KB

  • memory/2808-7002-0x0000000074C50000-0x000000007533E000-memory.dmp

    Filesize

    6.9MB

  • memory/2808-7003-0x0000000004C80000-0x0000000004CC0000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.