Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 02:29
Behavioral task
behavioral1
Sample
08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14.exe
Resource
win7-20231215-en
General
-
Target
08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14.exe
-
Size
1.9MB
-
MD5
14f6f2650e4115f846437a021780ad79
-
SHA1
11825457804c1aec20dfb7049bc9d21e409e8094
-
SHA256
08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14
-
SHA512
97b6237d078fde08a90dfd6d30f6196c17bf1b5ed02e5114d51fd0800e77dea5a27868dcea011347f79b6d19c3dd854fa8de118cedb61708d5e124e6e337ebf8
-
SSDEEP
24576:2TbBv5rUyXVHz9DD003FvrxyYsw14gO8clrAVwMsxeCXEaSmzFN4DKIaUfReHUBr:IBJTBn1UrAVslhPFN6mcMUB+OZwfu5Xl
Malware Config
Signatures
-
Detect ZGRat V1 5 IoCs
resource yara_rule behavioral1/files/0x000d00000001447a-12.dat family_zgrat_v1 behavioral1/memory/2812-13-0x0000000000FD0000-0x000000000116A000-memory.dmp family_zgrat_v1 behavioral1/files/0x002e000000014a45-33.dat family_zgrat_v1 behavioral1/files/0x002e000000014a45-34.dat family_zgrat_v1 behavioral1/memory/2200-35-0x0000000001070000-0x000000000120A000-memory.dmp family_zgrat_v1 -
Detects executables packed with unregistered version of .NET Reactor 5 IoCs
resource yara_rule behavioral1/files/0x000d00000001447a-12.dat INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2812-13-0x0000000000FD0000-0x000000000116A000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/files/0x002e000000014a45-33.dat INDICATOR_EXE_Packed_DotNetReactor behavioral1/files/0x002e000000014a45-34.dat INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2200-35-0x0000000001070000-0x000000000120A000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2812 ComContainerServercomponentDll.exe 2200 services.exe -
Loads dropped DLL 2 IoCs
pid Process 1256 cmd.exe 1256 cmd.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\services.exe ComContainerServercomponentDll.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\services.exe ComContainerServercomponentDll.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\c5b4cb5e9653cc ComContainerServercomponentDll.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\smss.exe ComContainerServercomponentDll.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\69ddcba757bf72 ComContainerServercomponentDll.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\lsm.exe ComContainerServercomponentDll.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\101b941d020240 ComContainerServercomponentDll.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IME\imekr8\help\lsass.exe ComContainerServercomponentDll.exe File created C:\Windows\IME\imekr8\help\6203df4a6bafc7 ComContainerServercomponentDll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2676 reg.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2812 ComContainerServercomponentDll.exe 2200 services.exe 2200 services.exe 2200 services.exe 2200 services.exe 2200 services.exe 2200 services.exe 2200 services.exe 2200 services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2812 ComContainerServercomponentDll.exe Token: SeDebugPrivilege 2200 services.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2184 1040 08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14.exe 28 PID 1040 wrote to memory of 2184 1040 08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14.exe 28 PID 1040 wrote to memory of 2184 1040 08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14.exe 28 PID 1040 wrote to memory of 2184 1040 08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14.exe 28 PID 2184 wrote to memory of 1256 2184 WScript.exe 29 PID 2184 wrote to memory of 1256 2184 WScript.exe 29 PID 2184 wrote to memory of 1256 2184 WScript.exe 29 PID 2184 wrote to memory of 1256 2184 WScript.exe 29 PID 1256 wrote to memory of 2676 1256 cmd.exe 31 PID 1256 wrote to memory of 2676 1256 cmd.exe 31 PID 1256 wrote to memory of 2676 1256 cmd.exe 31 PID 1256 wrote to memory of 2676 1256 cmd.exe 31 PID 1256 wrote to memory of 2812 1256 cmd.exe 32 PID 1256 wrote to memory of 2812 1256 cmd.exe 32 PID 1256 wrote to memory of 2812 1256 cmd.exe 32 PID 1256 wrote to memory of 2812 1256 cmd.exe 32 PID 2812 wrote to memory of 2564 2812 ComContainerServercomponentDll.exe 33 PID 2812 wrote to memory of 2564 2812 ComContainerServercomponentDll.exe 33 PID 2812 wrote to memory of 2564 2812 ComContainerServercomponentDll.exe 33 PID 2564 wrote to memory of 1980 2564 cmd.exe 35 PID 2564 wrote to memory of 1980 2564 cmd.exe 35 PID 2564 wrote to memory of 1980 2564 cmd.exe 35 PID 2564 wrote to memory of 2268 2564 cmd.exe 36 PID 2564 wrote to memory of 2268 2564 cmd.exe 36 PID 2564 wrote to memory of 2268 2564 cmd.exe 36 PID 2564 wrote to memory of 2200 2564 cmd.exe 37 PID 2564 wrote to memory of 2200 2564 cmd.exe 37 PID 2564 wrote to memory of 2200 2564 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14.exe"C:\Users\Admin\AppData\Local\Temp\08740960051185e079e88d77f1f416e05fb944a345863ce9182316dc3c0aab14.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainCrt\uO160iKFaqIee6ZiL0PaNpxC7NYj1k2S.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\chainCrt\2goA7iMauCLLFvlqdbFwLWtOroqqUhdI3rb.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:2676
-
-
C:\chainCrt\ComContainerServercomponentDll.exe"C:\chainCrt/ComContainerServercomponentDll.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8xtnlk7Fmr.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1980
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\services.exe"C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\services.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5f794898a90b74b144ecdc2087bfa048e
SHA1af51a5b4ebb95a636bc848732808fd7e42e0f475
SHA2568f16699c7511be45ec5b19d5275098bd58709af02e17d5494d0992d9378309ac
SHA51281a9dc22018822176cafa6981848ccb91b74e1845c7eaa26055647f0266875862793ac623a2d6546601ccca61b64a9326a780773ad8c299a70d0ec15ae7c50e6
-
Filesize
896KB
MD585b02c1310719e014723a849271b845e
SHA1be3d0085f8f86c2388e45186996abd1643f2d19f
SHA256d8d08612d1e81f9764933efeb9403dfb40b69f5ab9088b9d465d29e46fdabc34
SHA5125cb5b071017449d034f6e839a8ec6398975790640905696d53ec48456ad0c073bdaaa0a70c69317ee041663e8927cf5d18b895588cc5e7bf88c078a452174df3
-
Filesize
252B
MD50caf7333eaa1e62a9306fa587085fb11
SHA1bf93d983015407de7f2c338af7c97020a7d3fd79
SHA2565f4cf3ef21c138fb2cab830434e07122dc76337925a719fa39c26ac607feac5e
SHA512ab74624725bea137f860a17b249c696c1a7dd9609bde962d88a4c7b24dfd9ae8024a5c565935b2d557e3840bef5f920dd271f14423f629816c067a1aea4ff11d
-
Filesize
219B
MD52c6552d7067705b8adc060be796cc726
SHA1f1f4ca6df3799590d29048d8c0ef8c377b72b29a
SHA2568f6048c3efd9407d6e5503aa6d2bc17b0c9c73ea883e5567f30ee15c39af7034
SHA512969bb134f916e45c9f899ccaca82b1e5b5ad9859c758d5f0a514fa0b4d40c079ac14684d2066dbc29eca7e5d9271c3400d6b6fb9bb2707a85ce23edb7065c75d
-
Filesize
1.6MB
MD5c85bd715ac92063c07314d1ce33bb5a1
SHA136d690ccafaf3bcf312cb6055b1c33d18631cc01
SHA256a4bf8ca2423567b154b8938d825125d86763fc6cade00de52e90af39e17b366b
SHA512d5ab6661b7d00c54d486276e7744df1e55dac9e44c498c93ecac4e7250634be38be826ff5dbe3be8176fe32750e98e7b8525e6eb388473bd46ae946c3bf32fe0
-
Filesize
222B
MD5864c2b2879ddb78e052cd8710b7c74e2
SHA1065354d8ea5079825a29f4f9fb5a8f9fdddd660e
SHA256fe19dff47eb716ff953aadbc4db9de1925f2c082c0030171687b925a5de56360
SHA51208610b687b5eddd01eb77fcd18e1ad9098a471d2ed366b4c244c9a973eaef76e1b5dd8a4c1f0e65d71734f0412a228360fe2f110128ff3b191c37a4527f2d11f