Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231215-en
General
-
Target
tmp.exe
-
Size
1.1MB
-
MD5
7f10c635e0952b50be339aaad2f63df5
-
SHA1
26e8b3b179e8717c1e3d16b3e84a4a50e5e4f282
-
SHA256
9ba372b8822cbf5a131c426cc16a1e7d1ded7ade81b1b2887ac70ad8c001beb8
-
SHA512
009c6a22829b1fe89678b077e7ad4557408ab317f789c610080c2b3a454e1d8a8b1ecd0bf90df28cf8c7d0d9a456688d4ac73a92f10ca14bd5977db1ab0b2264
-
SSDEEP
24576:ys4YTKDbbnCFPQWWxU7GbyggPiwJEEhwsio2:9BmaF0U6hgzZC
Malware Config
Signatures
-
Detect ZGRat V1 36 IoCs
resource yara_rule behavioral1/memory/2080-2-0x00000000045E0000-0x000000000470A000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-3-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-6-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-4-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-8-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-10-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-12-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-14-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-16-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-20-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-18-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-22-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-24-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-28-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-26-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-30-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-34-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-32-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-36-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-40-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-38-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-44-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-52-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-50-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-54-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-48-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-46-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-56-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-60-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-62-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-58-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-64-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-42-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/2080-66-0x00000000045E0000-0x0000000004703000-memory.dmp family_zgrat_v1 behavioral1/memory/1620-959-0x0000000002240000-0x0000000002328000-memory.dmp family_zgrat_v1 behavioral1/memory/2932-6702-0x00000000010E0000-0x0000000001160000-memory.dmp family_zgrat_v1 -
Executes dropped EXE 2 IoCs
pid Process 2896 BaseDirectory.exe 1608 BaseDirectory.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gmjok = "C:\\Users\\Admin\\AppData\\Roaming\\Gmjok.exe" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gmjok = "C:\\Users\\Admin\\AppData\\Roaming\\Gmjok.exe" BaseDirectory.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2080 set thread context of 1620 2080 tmp.exe 28 PID 2896 set thread context of 1608 2896 BaseDirectory.exe 38 PID 1608 set thread context of 556 1608 BaseDirectory.exe 39 PID 556 set thread context of 1792 556 MSBuild.exe 42 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2696 powershell.exe 1608 BaseDirectory.exe 1608 BaseDirectory.exe 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2080 tmp.exe Token: SeDebugPrivilege 1620 tmp.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 2896 BaseDirectory.exe Token: SeDebugPrivilege 1608 BaseDirectory.exe Token: SeDebugPrivilege 556 MSBuild.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 1792 MSBuild.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2080 wrote to memory of 1620 2080 tmp.exe 28 PID 2964 wrote to memory of 2696 2964 taskeng.exe 32 PID 2964 wrote to memory of 2696 2964 taskeng.exe 32 PID 2964 wrote to memory of 2696 2964 taskeng.exe 32 PID 2836 wrote to memory of 2896 2836 taskeng.exe 37 PID 2836 wrote to memory of 2896 2836 taskeng.exe 37 PID 2836 wrote to memory of 2896 2836 taskeng.exe 37 PID 2836 wrote to memory of 2896 2836 taskeng.exe 37 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 2896 wrote to memory of 1608 2896 BaseDirectory.exe 38 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 1608 wrote to memory of 556 1608 BaseDirectory.exe 39 PID 2964 wrote to memory of 2932 2964 taskeng.exe 40 PID 2964 wrote to memory of 2932 2964 taskeng.exe 40 PID 2964 wrote to memory of 2932 2964 taskeng.exe 40 PID 556 wrote to memory of 1792 556 MSBuild.exe 42 PID 556 wrote to memory of 1792 556 MSBuild.exe 42 PID 556 wrote to memory of 1792 556 MSBuild.exe 42 PID 556 wrote to memory of 1792 556 MSBuild.exe 42 PID 556 wrote to memory of 1792 556 MSBuild.exe 42 PID 556 wrote to memory of 1792 556 MSBuild.exe 42 PID 556 wrote to memory of 1792 556 MSBuild.exe 42 PID 556 wrote to memory of 1792 556 MSBuild.exe 42 PID 556 wrote to memory of 1792 556 MSBuild.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {980745E1-E313-4383-8653-29BED17A8448} S-1-5-21-2444714103-3190537498-3629098939-1000:DJLAPDMX\Admin:S4U:1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABCAGEAcwBlAEQAaQByAGUAYwB0AG8AcgB5AC4AZQB4AGUAOwA=2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABCAGEAcwBlAEQAaQByAGUAYwB0AG8AcgB5AC4AZQB4AGUAOwA=2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7EB62D10-D3FB-415F-9072-E0CA74A757B4} S-1-5-21-2444714103-3190537498-3629098939-1000:DJLAPDMX\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exeC:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exeC:\Users\Admin\AppData\Local\_NewEnum\fgpgxz\BaseDirectory.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD57f10c635e0952b50be339aaad2f63df5
SHA126e8b3b179e8717c1e3d16b3e84a4a50e5e4f282
SHA2569ba372b8822cbf5a131c426cc16a1e7d1ded7ade81b1b2887ac70ad8c001beb8
SHA512009c6a22829b1fe89678b077e7ad4557408ab317f789c610080c2b3a454e1d8a8b1ecd0bf90df28cf8c7d0d9a456688d4ac73a92f10ca14bd5977db1ab0b2264
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58750bb6bf4d71be6b1195fd6a7348dfe
SHA170bd0740e9a1265e0b4f2f64b52721883fd2105d
SHA2568a8d680adc23040185cee5efcf7a5bf964ca7e0cc0756dd9804d99e18cf01d86
SHA512d2666da2fc2718d91b1d4a714ddbfef5aae142103f042ef8a77eab26bd97dc3fa65cd0b178fadc6c90bb0ed874dcf7f478a3cd450743286866475cf96d1032eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A4PPAM1CO5JD3EQP2D66.temp
Filesize7KB
MD5861cd3d1b3e2ce9177e3d67dd51948cb
SHA1f6c79b758a616f640a1a390cb45cb458f66ae1f2
SHA2568afab6ebbc557b29c45c583f37d6129bb41c1619e35fdfeb454821a34f82402e
SHA512f286d3ed2824fd411cc8b2c3a0f982a9ccc004d42c30b344bd1633ac88a8a679e65d9ef0f0844b3f16f2d9df5f50bda9feb2d260feee73d96f04d04d1f610fcb