Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
983ffa6d57f86647306da729613df330.exe
Resource
win7-20231215-en
General
-
Target
983ffa6d57f86647306da729613df330.exe
-
Size
984KB
-
MD5
983ffa6d57f86647306da729613df330
-
SHA1
9cbc4aa1b4f5566a7d8a9c508edc7cc96772c1c0
-
SHA256
4c9a06f79b7bab68122b2d164b63523dceb0205d044c8d230bb758d7fc4729e8
-
SHA512
90d5b58598e2e8a904363058441956df840cf75389bc8f89b28fe70fd8ef2c7c98c70928ac208002550a127affe57668692d18bc0dd5bdab6f5f2095ebdd6313
-
SSDEEP
12288:vz+MO8FsF87bhQxUKKKVxe8QuWtajt6iLq17BKGUEsLDw:b+MOQW87bhQxtVUwWa6iLe76Ei
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral2/memory/2656-9-0x0000000007E40000-0x0000000007EC6000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-15-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-17-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-13-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-11-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-27-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-37-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-45-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-43-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-41-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-61-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-73-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-71-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-69-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-67-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-65-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-63-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-59-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-57-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-55-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-53-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-51-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-49-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-47-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-39-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-35-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-33-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-31-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-29-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-25-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-23-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-21-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-19-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2656-10-0x0000000007E40000-0x0000000007EC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4600-2499-0x0000000000400000-0x000000000042A000-memory.dmp family_zgrat_v1 -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Chrome.exe\"," 983ffa6d57f86647306da729613df330.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2988 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 983ffa6d57f86647306da729613df330.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be937d468bd7ccbdb0fce33bdaf48c70.exe 983ffa6d57f86647306da729613df330.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be937d468bd7ccbdb0fce33bdaf48c70.exe 983ffa6d57f86647306da729613df330.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\be937d468bd7ccbdb0fce33bdaf48c70 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\983ffa6d57f86647306da729613df330.exe\" .." 983ffa6d57f86647306da729613df330.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\be937d468bd7ccbdb0fce33bdaf48c70 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\983ffa6d57f86647306da729613df330.exe\" .." 983ffa6d57f86647306da729613df330.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2656 set thread context of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings 983ffa6d57f86647306da729613df330.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 983ffa6d57f86647306da729613df330.exe 2656 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe 4600 983ffa6d57f86647306da729613df330.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2656 983ffa6d57f86647306da729613df330.exe Token: SeDebugPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: SeDebugPrivilege 1972 powershell.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe Token: 33 4600 983ffa6d57f86647306da729613df330.exe Token: SeIncBasePriorityPrivilege 4600 983ffa6d57f86647306da729613df330.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3704 2656 983ffa6d57f86647306da729613df330.exe 91 PID 2656 wrote to memory of 3704 2656 983ffa6d57f86647306da729613df330.exe 91 PID 2656 wrote to memory of 3704 2656 983ffa6d57f86647306da729613df330.exe 91 PID 2656 wrote to memory of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 PID 2656 wrote to memory of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 PID 2656 wrote to memory of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 PID 2656 wrote to memory of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 PID 2656 wrote to memory of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 PID 2656 wrote to memory of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 PID 2656 wrote to memory of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 PID 2656 wrote to memory of 4600 2656 983ffa6d57f86647306da729613df330.exe 92 PID 3704 wrote to memory of 1972 3704 WScript.exe 93 PID 3704 wrote to memory of 1972 3704 WScript.exe 93 PID 3704 wrote to memory of 1972 3704 WScript.exe 93 PID 4600 wrote to memory of 2988 4600 983ffa6d57f86647306da729613df330.exe 96 PID 4600 wrote to memory of 2988 4600 983ffa6d57f86647306da729613df330.exe 96 PID 4600 wrote to memory of 2988 4600 983ffa6d57f86647306da729613df330.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\983ffa6d57f86647306da729613df330.exe"C:\Users\Admin\AppData\Local\Temp\983ffa6d57f86647306da729613df330.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Wstvstiulknlrmkszuhfp.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome.exe'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\983ffa6d57f86647306da729613df330.exeC:\Users\Admin\AppData\Local\Temp\983ffa6d57f86647306da729613df330.exe2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\983ffa6d57f86647306da729613df330.exe" "983ffa6d57f86647306da729613df330.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2988
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\983ffa6d57f86647306da729613df330.exe.log
Filesize1KB
MD5b5291f3dcf2c13784e09a057f2e43d13
SHA1fbb72f4b04269e0d35b1d9c29d02d63dbc7ad07e
SHA256ad995b51344d71019f96fc3a424de00256065daad8595ff599f6849c87ae75ce
SHA51211c89caac425bccaa24e2bb24c6f2b4e6d6863278bf8a5304a42bb44475b08ca586e09143e7d5b14db7f1cd9adacd5358769e0d999dc348073431031067bd4d4
-
Filesize
174B
MD59ddcc4f0461d539fcb94a37a1eb1e0ba
SHA1930e0dd65c6ed6e710809940f9ac4d0747d3ab43
SHA2567b4862f9628d5d53ea11f559eb7dbc5c53068cf4b7c3c499334f2537c91131cc
SHA5127585d527b8bacc8c500816001e271eb70015f8782fb97264c7e35642d88ba6aa51a952f602275334763ab9fcb3b045780fe76dcf094c5cade865e8bb8efdb913
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82