Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 02:37

General

  • Target

    78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe

  • Size

    1.8MB

  • MD5

    afa014338532a8f730aa8e6b5ca09874

  • SHA1

    0a55224d9cf55e5ab12087a8af15612d75753d33

  • SHA256

    78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce

  • SHA512

    5c947b9342d83147633c0956d3af8453b7d6390c78836c810d13d60fe30528d2a74720430104503650ab1ba426cae8554ddd10e002f32d83855b220eb4ac881f

  • SSDEEP

    24576:XZkERkn0rQKC/L5ZQk/Pv6mD6JtkOW4l2f1yz+dGP4hSjdirHEbxn4uYRtqMSZ8I:XZbRk0wXPvp0kNxdCgkdi4tnYnJI

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Detects executables packed with unregistered version of .NET Reactor 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe
    "C:\Users\Admin\AppData\Local\Temp\78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VFrE9ifsfw.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2076
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:2880
          • C:\Windows\IME\IMETC10\HELP\csrss.exe
            "C:\Windows\IME\IMETC10\HELP\csrss.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2708

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft Analysis Services\System.exe

        Filesize

        1.8MB

        MD5

        afa014338532a8f730aa8e6b5ca09874

        SHA1

        0a55224d9cf55e5ab12087a8af15612d75753d33

        SHA256

        78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce

        SHA512

        5c947b9342d83147633c0956d3af8453b7d6390c78836c810d13d60fe30528d2a74720430104503650ab1ba426cae8554ddd10e002f32d83855b220eb4ac881f

      • C:\Users\Admin\AppData\Local\Temp\VFrE9ifsfw.bat

        Filesize

        213B

        MD5

        665b5295d7d619199f3f6161c571bc9b

        SHA1

        03fe7333b825bed00bb4da4f8d02b7b287bfb264

        SHA256

        c90bbebf22fd1f2ea49b9cbbe4e9729643ae9f0f452775bd55e3bbc83a898991

        SHA512

        2be7e490561864877bf9e4c593751c40ddb94a82ee243944a54ee23120b27673ae95ea9acb981e1db87064f000510bde317317624b25fc383e503d79a421c129

      • memory/1372-33-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

        Filesize

        9.9MB

      • memory/1372-3-0x0000000000150000-0x0000000000151000-memory.dmp

        Filesize

        4KB

      • memory/1372-0-0x0000000000FE0000-0x00000000011BE000-memory.dmp

        Filesize

        1.9MB

      • memory/1372-5-0x00000000770C0000-0x00000000770C1000-memory.dmp

        Filesize

        4KB

      • memory/1372-7-0x000000001B240000-0x000000001B2C0000-memory.dmp

        Filesize

        512KB

      • memory/1372-8-0x0000000000380000-0x000000000038E000-memory.dmp

        Filesize

        56KB

      • memory/1372-10-0x00000000003B0000-0x00000000003CC000-memory.dmp

        Filesize

        112KB

      • memory/1372-11-0x00000000770B0000-0x00000000770B1000-memory.dmp

        Filesize

        4KB

      • memory/1372-12-0x00000000770A0000-0x00000000770A1000-memory.dmp

        Filesize

        4KB

      • memory/1372-14-0x00000000003D0000-0x00000000003E8000-memory.dmp

        Filesize

        96KB

      • memory/1372-16-0x0000000000390000-0x000000000039E000-memory.dmp

        Filesize

        56KB

      • memory/1372-17-0x0000000077090000-0x0000000077091000-memory.dmp

        Filesize

        4KB

      • memory/1372-2-0x000000001B240000-0x000000001B2C0000-memory.dmp

        Filesize

        512KB

      • memory/1372-1-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

        Filesize

        9.9MB

      • memory/1372-4-0x000000001B240000-0x000000001B2C0000-memory.dmp

        Filesize

        512KB

      • memory/2708-72-0x000000001B3C0000-0x000000001B440000-memory.dmp

        Filesize

        512KB

      • memory/2708-45-0x00000000770B0000-0x00000000770B1000-memory.dmp

        Filesize

        4KB

      • memory/2708-38-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/2708-39-0x000000001B3C0000-0x000000001B440000-memory.dmp

        Filesize

        512KB

      • memory/2708-40-0x000000001B3C0000-0x000000001B440000-memory.dmp

        Filesize

        512KB

      • memory/2708-42-0x00000000770C0000-0x00000000770C1000-memory.dmp

        Filesize

        4KB

      • memory/2708-43-0x000000001B3C0000-0x000000001B440000-memory.dmp

        Filesize

        512KB

      • memory/2708-37-0x000007FEF4CA0000-0x000007FEF568C000-memory.dmp

        Filesize

        9.9MB

      • memory/2708-47-0x00000000770A0000-0x00000000770A1000-memory.dmp

        Filesize

        4KB

      • memory/2708-49-0x0000000077090000-0x0000000077091000-memory.dmp

        Filesize

        4KB

      • memory/2708-50-0x000007FEF4CA0000-0x000007FEF568C000-memory.dmp

        Filesize

        9.9MB

      • memory/2708-51-0x000000001B3C0000-0x000000001B440000-memory.dmp

        Filesize

        512KB

      • memory/2708-52-0x000000001B3C0000-0x000000001B440000-memory.dmp

        Filesize

        512KB

      • memory/2708-53-0x000000001B3C0000-0x000000001B440000-memory.dmp

        Filesize

        512KB

      • memory/2708-70-0x000000001B3C0000-0x000000001B440000-memory.dmp

        Filesize

        512KB

      • memory/2708-36-0x0000000000C50000-0x0000000000E2E000-memory.dmp

        Filesize

        1.9MB