Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 04:17

General

  • Target

    78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe

  • Size

    1.8MB

  • MD5

    afa014338532a8f730aa8e6b5ca09874

  • SHA1

    0a55224d9cf55e5ab12087a8af15612d75753d33

  • SHA256

    78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce

  • SHA512

    5c947b9342d83147633c0956d3af8453b7d6390c78836c810d13d60fe30528d2a74720430104503650ab1ba426cae8554ddd10e002f32d83855b220eb4ac881f

  • SSDEEP

    24576:XZkERkn0rQKC/L5ZQk/Pv6mD6JtkOW4l2f1yz+dGP4hSjdirHEbxn4uYRtqMSZ8I:XZbRk0wXPvp0kNxdCgkdi4tnYnJI

Malware Config

Signatures

  • Detect ZGRat V1 4 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Detects executables packed with unregistered version of .NET Reactor 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe
    "C:\Users\Admin\AppData\Local\Temp\78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\olvetbYR6y.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3076
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:208
        • C:\Users\Admin\Pictures\Camera Roll\Idle.exe
          "C:\Users\Admin\Pictures\Camera Roll\Idle.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\olvetbYR6y.bat

      Filesize

      172B

      MD5

      db3b0f44788daff38ffb63574d1c9b17

      SHA1

      424f5638686026aa2050d485688cacb4aee663a7

      SHA256

      1cda0e010a3ad1f4d20d4918f6596075ea104f2d787fa166c1fabe1f8c20d61a

      SHA512

      3473c7e3f9dcb869e8f24c808a2302fa9fb66cf1c8fde27e161bc36d83afdf74d8e25816365bcdec1d3dcb0abd80127d87d9cafab3a356fa710cf146fc7a6d26

    • C:\Users\Admin\Pictures\Camera Roll\Idle.exe

      Filesize

      1.4MB

      MD5

      74cf4f14100db8eecbfe6378f2d3ea31

      SHA1

      d658bcc44a3deeb3c81d150e4d3b6fc32f1986be

      SHA256

      8d550eaee354d152312a679b74bc8402fdbb3e3abb109eb29fa713eea6e664f7

      SHA512

      c9991b7724c6ef5cf780583c29de9c7c0330e46e77d6887ab58f1df7e32850f4e8659099bdb52c2cd4d176921fc90fabed6dc880efa149af5636b35ba78d0b69

    • C:\Users\Admin\Pictures\Camera Roll\Idle.exe

      Filesize

      1.1MB

      MD5

      1f26c0e34edd23f834aaf35b0f5c1b83

      SHA1

      85416428f1c0470b169f80660b8a5511c9f0d57c

      SHA256

      1bb72ecfa8e867bc7190555ff53fe5568b8d3efacc3a2c97012805d7334c1221

      SHA512

      5b5fe96717fd7a5be260f17271f85f5c3dbc8ef0eddd37c43404300dede78ae3e98ab0c969a1cd7647193a95c25bf53bbffa4b380012953af58d13bcfdf31ddb

    • C:\odt\lsass.exe

      Filesize

      1.8MB

      MD5

      afa014338532a8f730aa8e6b5ca09874

      SHA1

      0a55224d9cf55e5ab12087a8af15612d75753d33

      SHA256

      78a0343b36930749e066ca0bf9a171b338fd00e9dbe3d6e364e06eb4e78cf0ce

      SHA512

      5c947b9342d83147633c0956d3af8453b7d6390c78836c810d13d60fe30528d2a74720430104503650ab1ba426cae8554ddd10e002f32d83855b220eb4ac881f

    • memory/1696-38-0x00007FFE44430000-0x00007FFE444EE000-memory.dmp

      Filesize

      760KB

    • memory/1696-8-0x0000000000FC0000-0x0000000000FCE000-memory.dmp

      Filesize

      56KB

    • memory/1696-0-0x0000000000720000-0x00000000008FE000-memory.dmp

      Filesize

      1.9MB

    • memory/1696-2-0x0000000000F80000-0x0000000000F81000-memory.dmp

      Filesize

      4KB

    • memory/1696-5-0x00007FFE44430000-0x00007FFE444EE000-memory.dmp

      Filesize

      760KB

    • memory/1696-12-0x00000000012A0000-0x00000000012BC000-memory.dmp

      Filesize

      112KB

    • memory/1696-10-0x00007FFE44430000-0x00007FFE444EE000-memory.dmp

      Filesize

      760KB

    • memory/1696-13-0x00007FFE44410000-0x00007FFE44411000-memory.dmp

      Filesize

      4KB

    • memory/1696-14-0x0000000002BE0000-0x0000000002C30000-memory.dmp

      Filesize

      320KB

    • memory/1696-16-0x00000000012C0000-0x00000000012D8000-memory.dmp

      Filesize

      96KB

    • memory/1696-17-0x00007FFE43CC0000-0x00007FFE43CC1000-memory.dmp

      Filesize

      4KB

    • memory/1696-20-0x0000000000FD0000-0x0000000000FDE000-memory.dmp

      Filesize

      56KB

    • memory/1696-18-0x00007FFE43CB0000-0x00007FFE43CB1000-memory.dmp

      Filesize

      4KB

    • memory/1696-4-0x000000001B680000-0x000000001B690000-memory.dmp

      Filesize

      64KB

    • memory/1696-1-0x00007FFE27BA0000-0x00007FFE28661000-memory.dmp

      Filesize

      10.8MB

    • memory/1696-37-0x00007FFE27BA0000-0x00007FFE28661000-memory.dmp

      Filesize

      10.8MB

    • memory/1696-9-0x000000001B680000-0x000000001B690000-memory.dmp

      Filesize

      64KB

    • memory/1696-3-0x000000001B680000-0x000000001B690000-memory.dmp

      Filesize

      64KB

    • memory/1696-6-0x00007FFE44420000-0x00007FFE44421000-memory.dmp

      Filesize

      4KB

    • memory/3972-43-0x0000000001650000-0x0000000001651000-memory.dmp

      Filesize

      4KB

    • memory/3972-49-0x000000001BAC0000-0x000000001BAD0000-memory.dmp

      Filesize

      64KB

    • memory/3972-42-0x00007FFE27850000-0x00007FFE28311000-memory.dmp

      Filesize

      10.8MB

    • memory/3972-45-0x000000001BAC0000-0x000000001BAD0000-memory.dmp

      Filesize

      64KB

    • memory/3972-44-0x000000001BAC0000-0x000000001BAD0000-memory.dmp

      Filesize

      64KB

    • memory/3972-48-0x00007FFE44420000-0x00007FFE44421000-memory.dmp

      Filesize

      4KB

    • memory/3972-47-0x00007FFE44430000-0x00007FFE444EE000-memory.dmp

      Filesize

      760KB

    • memory/3972-56-0x00007FFE27850000-0x00007FFE28311000-memory.dmp

      Filesize

      10.8MB

    • memory/3972-55-0x00007FFE43CB0000-0x00007FFE43CB1000-memory.dmp

      Filesize

      4KB

    • memory/3972-53-0x00007FFE43CC0000-0x00007FFE43CC1000-memory.dmp

      Filesize

      4KB

    • memory/3972-88-0x000000001BAC0000-0x000000001BAD0000-memory.dmp

      Filesize

      64KB

    • memory/3972-57-0x000000001BAC0000-0x000000001BAD0000-memory.dmp

      Filesize

      64KB

    • memory/3972-58-0x000000001BAC0000-0x000000001BAD0000-memory.dmp

      Filesize

      64KB

    • memory/3972-59-0x00007FFE44430000-0x00007FFE444EE000-memory.dmp

      Filesize

      760KB

    • memory/3972-60-0x000000001BAC0000-0x000000001BAD0000-memory.dmp

      Filesize

      64KB

    • memory/3972-87-0x000000001BAC0000-0x000000001BAD0000-memory.dmp

      Filesize

      64KB

    • memory/3972-50-0x00007FFE44410000-0x00007FFE44411000-memory.dmp

      Filesize

      4KB