Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 04:39

General

  • Target

    78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe

  • Size

    1.8MB

  • MD5

    afa014338532a8f730aa8e6b5ca09874

  • SHA1

    0a55224d9cf55e5ab12087a8af15612d75753d33

  • SHA256

    78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce

  • SHA512

    5c947b9342d83147633c0956d3af8453b7d6390c78836c810d13d60fe30528d2a74720430104503650ab1ba426cae8554ddd10e002f32d83855b220eb4ac881f

  • SSDEEP

    24576:XZkERkn0rQKC/L5ZQk/Pv6mD6JtkOW4l2f1yz+dGP4hSjdirHEbxn4uYRtqMSZ8I:XZbRk0wXPvp0kNxdCgkdi4tnYnJI

Malware Config

Signatures

  • Detect ZGRat V1 5 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Detects executables packed with unregistered version of .NET Reactor 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe
    "C:\Users\Admin\AppData\Local\Temp\78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ckp0yiFHFr.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\Downloaded Program Files\dwm.exe
        "C:\Windows\Downloaded Program Files\dwm.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
  • C:\Windows\system32\PING.EXE
    ping -n 10 localhost
    1⤵
    • Runs ping.exe
    PID:2840
  • C:\Windows\system32\chcp.com
    chcp 65001
    1⤵
      PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ckp0yiFHFr.bat

      Filesize

      171B

      MD5

      6fc9d0d302ec94b9ee9533183934e6b9

      SHA1

      db3bd51b5bdd7c3579294b3fec29920ca91260f7

      SHA256

      dd45906358ccaedf201e978c2aefde64b28446cc22a371c8a324d68502d0a230

      SHA512

      953b6e0ff44f38cdef546e321334c08870c5603490afc0c3272e83bad7e6875cd2ca2a8073a88a8fb5741c544e90a06dd334e90f0af17850ac77deb56b42e198

    • C:\Windows\Downloaded Program Files\dwm.exe

      Filesize

      373KB

      MD5

      03558ec2e906918d7c2a61b89b3b94cc

      SHA1

      38429173c85d0fccd33a65fd35a5dc0b65c6b839

      SHA256

      3bd86d85b8869a7c72f754355789844a329b08b4d43b67b88d1214ad650f90db

      SHA512

      9fa5183246703c650d59be5d8a10af2d1b0bb27ccd0d92f921792dcaefbc19109ff316634a89df2230e385075490e34708b084d42110eb6fceaed37090bee9bb

    • C:\Windows\Downloaded Program Files\dwm.exe

      Filesize

      525KB

      MD5

      72606b07f41402ea1594a052d53b7161

      SHA1

      37ee893195f2574d332bccd23f32fe9c91f69984

      SHA256

      8d6d0b2a8d8cc5ea66606d782ea147e8cd73e9bd0ed6c57d9054e5877a94e341

      SHA512

      abeae7d90efb4336a2753a2acb9f6247bbbc9d99eb11b2a3cb7ee1dadaef1204a8aed2de791de033b8d32aa25e1e8a9716cd91b3935c05418f00ec41e7cfaf2f

    • C:\Windows\debug\WIA\lsass.exe

      Filesize

      136KB

      MD5

      e4e26d0e1e04e337b3dc9a912d4c75b8

      SHA1

      4ad240727e216048776a97fb762e77d6ed0e7c38

      SHA256

      86bd2dfd3b8ef70d304a7ec4e12708cdb296fb481f84f74f0f12d90da0db2ef1

      SHA512

      f7e583af5a9c838f959b79205c525c1a068e195b75657a90ba1949fdb80c32228973f58e7905958757c03865e839f63c222d2237c0c3290a4adeaeca6b73df99

    • memory/2752-47-0x0000000077160000-0x0000000077161000-memory.dmp

      Filesize

      4KB

    • memory/2752-45-0x0000000077170000-0x0000000077171000-memory.dmp

      Filesize

      4KB

    • memory/2752-71-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/2752-70-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/2752-53-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/2752-52-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/2752-51-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/2752-50-0x000007FEF4DD0000-0x000007FEF57BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2752-42-0x0000000077180000-0x0000000077181000-memory.dmp

      Filesize

      4KB

    • memory/2752-44-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/2752-49-0x0000000077150000-0x0000000077151000-memory.dmp

      Filesize

      4KB

    • memory/2752-40-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/2752-37-0x000007FEF4DD0000-0x000007FEF57BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2752-38-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2752-36-0x0000000001150000-0x000000000132E000-memory.dmp

      Filesize

      1.9MB

    • memory/2752-39-0x000000001B1D0000-0x000000001B250000-memory.dmp

      Filesize

      512KB

    • memory/2964-10-0x00000000005D0000-0x00000000005EC000-memory.dmp

      Filesize

      112KB

    • memory/2964-12-0x0000000077160000-0x0000000077161000-memory.dmp

      Filesize

      4KB

    • memory/2964-1-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2964-7-0x0000000077180000-0x0000000077181000-memory.dmp

      Filesize

      4KB

    • memory/2964-0-0x0000000000C30000-0x0000000000E0E000-memory.dmp

      Filesize

      1.9MB

    • memory/2964-8-0x0000000000AA0000-0x0000000000B20000-memory.dmp

      Filesize

      512KB

    • memory/2964-6-0x0000000000480000-0x000000000048E000-memory.dmp

      Filesize

      56KB

    • memory/2964-11-0x0000000077170000-0x0000000077171000-memory.dmp

      Filesize

      4KB

    • memory/2964-2-0x0000000000AA0000-0x0000000000B20000-memory.dmp

      Filesize

      512KB

    • memory/2964-14-0x00000000005F0000-0x0000000000608000-memory.dmp

      Filesize

      96KB

    • memory/2964-33-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2964-3-0x0000000000430000-0x0000000000431000-memory.dmp

      Filesize

      4KB

    • memory/2964-4-0x0000000000AA0000-0x0000000000B20000-memory.dmp

      Filesize

      512KB

    • memory/2964-15-0x0000000077150000-0x0000000077151000-memory.dmp

      Filesize

      4KB

    • memory/2964-17-0x0000000000490000-0x000000000049E000-memory.dmp

      Filesize

      56KB