Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 01:09
Behavioral task
behavioral1
Sample
a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe
Resource
win7-20231215-en
General
-
Target
a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe
-
Size
1.5MB
-
MD5
4dd426b5b9cb7f9bb7a1b1c057a0c951
-
SHA1
a6f9518d57d3a0fa683fb23842870d25f6b79133
-
SHA256
a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4
-
SHA512
6eaf6ac8186d57dd3a6190fcc556686a9069c776118e4f55ebfb5361cb2b9e317eb7b9c67062f15a93d755ff01bc5563d18fd4453049e7347f16609b32d07d36
-
SSDEEP
24576:3hAk70TrcnXpatsCu7IfLKZnikPhhUF54clNf7+6uHAW92zt/sWu2BSMCqDoRo:OkQTA5Qw7CSikJo54clgLH+tkWJ0NC
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/2344-16-0x00000000048B0000-0x000000000494C000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-21-0x0000000004810000-0x00000000048AA000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-22-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-23-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-29-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-27-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-25-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-39-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-41-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-37-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-43-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-55-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-61-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-63-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-65-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-59-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-57-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-67-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-53-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-51-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-69-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-49-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-47-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-71-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-85-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-83-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-81-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-79-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-77-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-75-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-73-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-45-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-35-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-33-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 behavioral1/memory/2344-31-0x0000000004810000-0x00000000048A4000-memory.dmp family_zgrat_v1 -
Detects Echelon Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/1416-0-0x0000000000AA0000-0x0000000000C22000-memory.dmp family_echelon -
Executes dropped EXE 1 IoCs
pid Process 2344 Decoder.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 7 freegeoip.app 8 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Decoder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Decoder.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2804 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2344 Decoder.exe 2344 Decoder.exe 2344 Decoder.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1416 a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe Token: SeDebugPrivilege 2344 Decoder.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2344 1416 a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe 29 PID 1416 wrote to memory of 2344 1416 a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe 29 PID 1416 wrote to memory of 2344 1416 a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe 29 PID 1416 wrote to memory of 2344 1416 a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe 29 PID 1416 wrote to memory of 2700 1416 a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe 30 PID 1416 wrote to memory of 2700 1416 a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe 30 PID 1416 wrote to memory of 2700 1416 a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe 30 PID 2700 wrote to memory of 2804 2700 cmd.exe 32 PID 2700 wrote to memory of 2804 2700 cmd.exe 32 PID 2700 wrote to memory of 2804 2700 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe"C:\Users\Admin\AppData\Local\Temp\a08b92e0ef621c731c9c9a0a38095df4515f95c8200e508d772cf533395bcab4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\ProgramData\Decoder.exe"C:\ProgramData\Decoder.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD5c29c0d495ed13e703f433d53bdffdab8
SHA174ed36e6b6027b61abcfe2956670ffd9de7fd71a
SHA25620309707aa6fc678963aace7685a37839d439c850b1ba399bdbfbbeddc10ed4b
SHA512fea4c1066ee6df3ebb29a354678a3d0f1398cd216b92b261296fcff580b00e19cefe24d975beebcc41854cceef3df2702d569811358dae4203a924fb52cf5426
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
96B
MD575a57e4ba8b79c155598aacf3447fd6e
SHA11dc8a5201f1ee1321156cb49da1e925a63c6e508
SHA256261ce58adad028492c7ff5d64469c56fe3496e64820510b39cb151eca14134d2
SHA5122527b347463e0397cf63f1600e2c6c89c35207edfe78acee345dd17e3c431e5d5e16f659b7ffa5affec92af191f24d3023d5d077d3b2a5be904f7607b7a85c39
-
Filesize
28B
MD5217407484aac2673214337def8886072
SHA10f8c4c94064ce1f7538c43987feb5bb2d7fec0c6
SHA256467c28ed423f513128575b1c8c6674ee5671096ff1b14bc4c32deebd89fc1797
SHA5128466383a1cb71ea8b049548fd5a41aaf01c0423743b886cd3cb5007f66bff87d8d5cfa67344451f4490c8f26e4ebf9e306075d5cfc655dc62f0813a456cf1330