Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 02:47

General

  • Target

    PO 803707375.exe

  • Size

    1.6MB

  • MD5

    d76fbdd502935147727b658a1f54606b

  • SHA1

    5b34d209f664bb04f4a9fa431159cc1e24ccf641

  • SHA256

    767ba9a305c7ecb8bf1779211e93bd673a8520015e64013f6e43a7ddd355f92f

  • SHA512

    c460b4706f85507d12b00a878585db4fbdeaca2abe9fe22239c67dbab9e12dbb3b64f212e5d0461b37254ce02bbcdbe0a7b3862155f387baebf3e6ca16f979d2

  • SSDEEP

    24576:Bu3lUF+zynY3kq1EP07HlzrGyiXoX/njc+9cRQ38mG:Bu+Y3kqJFzrcoX/njB9cY8

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO 803707375.exe
    "C:\Users\Admin\AppData\Local\Temp\PO 803707375.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    741139c1486dcec3c15b5c409c0153ab

    SHA1

    f40fb1b31e547c7f8a203ce86ad8712c5c23809e

    SHA256

    52528a5d417f4183b87620883efa2f1111aa69424fe0fd5d2fade208664a0a44

    SHA512

    5bf01b6c194af8ab5c85734a6baa42b5dd4ec0477bfa3455f58ad3f255556d2880525f9863dae6e362f8c85772ff8374753525ba4fcdd0e24a7ca7de4b211083

  • memory/2536-58-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-54-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-3-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-4-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-8-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-10-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-6-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-12-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-18-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-22-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-24-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-28-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-36-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-42-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-52-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-60-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-66-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-64-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-62-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-1-0x0000000074550000-0x0000000074C3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2536-2-0x0000000001150000-0x0000000001236000-memory.dmp

    Filesize

    920KB

  • memory/2536-50-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-56-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-48-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-46-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-44-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-40-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-38-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-34-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-32-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-30-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-26-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-20-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-16-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-14-0x0000000001150000-0x0000000001230000-memory.dmp

    Filesize

    896KB

  • memory/2536-1118-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/2536-1117-0x00000000048F0000-0x0000000004930000-memory.dmp

    Filesize

    256KB

  • memory/2536-1119-0x0000000001080000-0x00000000010EE000-memory.dmp

    Filesize

    440KB

  • memory/2536-1120-0x0000000000C50000-0x0000000000C9C000-memory.dmp

    Filesize

    304KB

  • memory/2536-1134-0x0000000074550000-0x0000000074C3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2536-0-0x0000000001240000-0x00000000013EA000-memory.dmp

    Filesize

    1.7MB