Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
814f22a67e6d2046f532f973f197c649.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
814f22a67e6d2046f532f973f197c649.exe
Resource
win10v2004-20231215-en
General
-
Target
814f22a67e6d2046f532f973f197c649.exe
-
Size
2.5MB
-
MD5
814f22a67e6d2046f532f973f197c649
-
SHA1
049bdddb3349ecf80c079a38297ee442190a38ad
-
SHA256
c2e1450509092251b7376c9d4acd0636b41c19060591c0ef6c3bb58ab7e49ee0
-
SHA512
696315f90cefdec65e8c2a4ca2d8f9b79fc4dce5f0bf186dd50bca398c5e9f9ea435232de639a3847460ce4331d85535a433ce7c07518977b2931ffcee6f326b
-
SSDEEP
49152:R6XZx5c96civqfPao3Hwa1VDhkYKt457bjG48GrbcE+SER:R6pxepiuR3Kt4Ra4N+1
Malware Config
Extracted
bitrat
1.38
179.43.141.103:1234
-
communication_password
dc647eb65e6711e155375218212b3964
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral2/memory/1596-10-0x0000000007F20000-0x0000000007F88000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-11-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-12-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-14-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-16-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-18-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-20-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-22-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-24-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-26-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-28-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-30-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-32-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-34-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-36-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-38-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-40-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-42-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-44-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-46-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-48-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-50-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-52-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-54-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-56-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-58-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-60-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-62-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-64-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-66-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-68-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-70-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-72-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-74-0x0000000007F20000-0x0000000007F82000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
814f22a67e6d2046f532f973f197c649.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvidiaShare = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Nvidia\\NvidiaShare.exe\"" 814f22a67e6d2046f532f973f197c649.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
814f22a67e6d2046f532f973f197c649.exepid process 5052 814f22a67e6d2046f532f973f197c649.exe 5052 814f22a67e6d2046f532f973f197c649.exe 5052 814f22a67e6d2046f532f973f197c649.exe 5052 814f22a67e6d2046f532f973f197c649.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
814f22a67e6d2046f532f973f197c649.exedescription pid process target process PID 1596 set thread context of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
814f22a67e6d2046f532f973f197c649.exepid process 1596 814f22a67e6d2046f532f973f197c649.exe 1596 814f22a67e6d2046f532f973f197c649.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
814f22a67e6d2046f532f973f197c649.exe814f22a67e6d2046f532f973f197c649.exedescription pid process Token: SeDebugPrivilege 1596 814f22a67e6d2046f532f973f197c649.exe Token: SeShutdownPrivilege 5052 814f22a67e6d2046f532f973f197c649.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
814f22a67e6d2046f532f973f197c649.exepid process 5052 814f22a67e6d2046f532f973f197c649.exe 5052 814f22a67e6d2046f532f973f197c649.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
814f22a67e6d2046f532f973f197c649.exedescription pid process target process PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe PID 1596 wrote to memory of 5052 1596 814f22a67e6d2046f532f973f197c649.exe 814f22a67e6d2046f532f973f197c649.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe"C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5052
-