Analysis

  • max time kernel
    136s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 03:13

General

  • Target

    8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe

  • Size

    1.6MB

  • MD5

    a2546c042f4e31597a83d5d0732d4730

  • SHA1

    214f01f4ef0c65e17fb3a42e43b1315c55c3f0c3

  • SHA256

    8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731

  • SHA512

    af5c23994c9a174efd1ac694dbc4aa2649eb8bb795701c8531d4b53d23a7d14ec9b1470b5250429771e8788c6fe7bf77bde549ee0655318777dc9b4ac7213215

  • SSDEEP

    24576:dpvTQJAutjYcQt3icthumBbD73S8GW1VMuAK/vfgGx7Dxeylmwv4SvOnJxKISR:vkqR7CpW1auAufgGFDxeKv/WKV

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Detects executables packed with unregistered version of .NET Reactor 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe
    "C:\Users\Admin\AppData\Local\Temp\8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VldraY8pBU.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5076
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:5072
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:3088
        • C:\Users\All Users\SoftwareDistribution\Registry.exe
          "C:\Users\All Users\SoftwareDistribution\Registry.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:4464

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\SoftwareDistribution\Registry.exe

            Filesize

            576KB

            MD5

            63beeb887264cb0011499ba184e9158a

            SHA1

            6049bd8625bc24ef618b599a294addc1e4c5655a

            SHA256

            bc79683af471fe9ea8918e702750f22c04727243c637acfb444794fcf93a11d8

            SHA512

            618b46ec1dfb934138f96aef04dc58d6d1cfa927d516b0e543979968578fb46a4cfbb5dd11f2ea67377e14143891002363b27d219b48ade61db3daa736229496

          • C:\ProgramData\SoftwareDistribution\Registry.exe

            Filesize

            1.6MB

            MD5

            a2546c042f4e31597a83d5d0732d4730

            SHA1

            214f01f4ef0c65e17fb3a42e43b1315c55c3f0c3

            SHA256

            8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731

            SHA512

            af5c23994c9a174efd1ac694dbc4aa2649eb8bb795701c8531d4b53d23a7d14ec9b1470b5250429771e8788c6fe7bf77bde549ee0655318777dc9b4ac7213215

          • C:\Users\Admin\AppData\Local\Temp\VldraY8pBU.bat

            Filesize

            180B

            MD5

            ad987a2b5dc3b33752f2894d296492a2

            SHA1

            184c06307890c6c0fe1fe817450afdad2f93d6f5

            SHA256

            bb73ec1ee003d13bfb56cfec559014ed77dd253c4558ad6c9f06da547c7f6f86

            SHA512

            7960e19605fe87d79b4246d9c9913f8b4e2a9599cbceca119fb9ad3577e045ad8a911d916d9c50e53d40eb1ee0aeec78edf7e551f7cf46548fa6485e416dd783

          • memory/3412-0-0x0000000000410000-0x00000000005A8000-memory.dmp

            Filesize

            1.6MB

          • memory/3412-1-0x00007FF99F8F0000-0x00007FF9A03B1000-memory.dmp

            Filesize

            10.8MB

          • memory/3412-2-0x000000001B0F0000-0x000000001B100000-memory.dmp

            Filesize

            64KB

          • memory/3412-3-0x0000000000E40000-0x0000000000E41000-memory.dmp

            Filesize

            4KB

          • memory/3412-21-0x00007FF99F8F0000-0x00007FF9A03B1000-memory.dmp

            Filesize

            10.8MB

          • memory/4464-25-0x00007FF99F6F0000-0x00007FF9A01B1000-memory.dmp

            Filesize

            10.8MB

          • memory/4464-26-0x000000001B700000-0x000000001B710000-memory.dmp

            Filesize

            64KB

          • memory/4464-27-0x0000000002B70000-0x0000000002B71000-memory.dmp

            Filesize

            4KB

          • memory/4464-28-0x000000001B700000-0x000000001B710000-memory.dmp

            Filesize

            64KB

          • memory/4464-29-0x000000001B700000-0x000000001B710000-memory.dmp

            Filesize

            64KB

          • memory/4464-30-0x00007FF99F6F0000-0x00007FF9A01B1000-memory.dmp

            Filesize

            10.8MB

          • memory/4464-31-0x000000001B700000-0x000000001B710000-memory.dmp

            Filesize

            64KB

          • memory/4464-32-0x000000001B700000-0x000000001B710000-memory.dmp

            Filesize

            64KB

          • memory/4464-33-0x000000001B700000-0x000000001B710000-memory.dmp

            Filesize

            64KB

          • memory/4464-34-0x000000001B700000-0x000000001B710000-memory.dmp

            Filesize

            64KB