Analysis
-
max time kernel
136s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 03:13
Behavioral task
behavioral1
Sample
8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe
Resource
win7-20231215-en
General
-
Target
8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe
-
Size
1.6MB
-
MD5
a2546c042f4e31597a83d5d0732d4730
-
SHA1
214f01f4ef0c65e17fb3a42e43b1315c55c3f0c3
-
SHA256
8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731
-
SHA512
af5c23994c9a174efd1ac694dbc4aa2649eb8bb795701c8531d4b53d23a7d14ec9b1470b5250429771e8788c6fe7bf77bde549ee0655318777dc9b4ac7213215
-
SSDEEP
24576:dpvTQJAutjYcQt3icthumBbD73S8GW1VMuAK/vfgGx7Dxeylmwv4SvOnJxKISR:vkqR7CpW1auAufgGFDxeKv/WKV
Malware Config
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/3412-0-0x0000000000410000-0x00000000005A8000-memory.dmp family_zgrat_v1 behavioral2/files/0x000600000002312e-13.dat family_zgrat_v1 behavioral2/files/0x000600000002312e-23.dat family_zgrat_v1 -
Detects executables packed with unregistered version of .NET Reactor 3 IoCs
resource yara_rule behavioral2/memory/3412-0-0x0000000000410000-0x00000000005A8000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral2/files/0x000600000002312e-13.dat INDICATOR_EXE_Packed_DotNetReactor behavioral2/files/0x000600000002312e-23.dat INDICATOR_EXE_Packed_DotNetReactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 Registry.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\27d1bcfc3c54e0 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe File created C:\Program Files (x86)\Windows Sidebar\System.exe 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Speech\Common\es-ES\RuntimeBroker.exe 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3088 PING.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 4464 Registry.exe 4464 Registry.exe 4464 Registry.exe 4464 Registry.exe 4464 Registry.exe 4464 Registry.exe 4464 Registry.exe 4464 Registry.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4464 Registry.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe Token: SeDebugPrivilege 4464 Registry.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3412 wrote to memory of 5076 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 85 PID 3412 wrote to memory of 5076 3412 8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe 85 PID 5076 wrote to memory of 5072 5076 cmd.exe 86 PID 5076 wrote to memory of 5072 5076 cmd.exe 86 PID 5076 wrote to memory of 3088 5076 cmd.exe 87 PID 5076 wrote to memory of 3088 5076 cmd.exe 87 PID 5076 wrote to memory of 4464 5076 cmd.exe 92 PID 5076 wrote to memory of 4464 5076 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe"C:\Users\Admin\AppData\Local\Temp\8aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VldraY8pBU.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5072
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:3088
-
-
C:\Users\All Users\SoftwareDistribution\Registry.exe"C:\Users\All Users\SoftwareDistribution\Registry.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD563beeb887264cb0011499ba184e9158a
SHA16049bd8625bc24ef618b599a294addc1e4c5655a
SHA256bc79683af471fe9ea8918e702750f22c04727243c637acfb444794fcf93a11d8
SHA512618b46ec1dfb934138f96aef04dc58d6d1cfa927d516b0e543979968578fb46a4cfbb5dd11f2ea67377e14143891002363b27d219b48ade61db3daa736229496
-
Filesize
1.6MB
MD5a2546c042f4e31597a83d5d0732d4730
SHA1214f01f4ef0c65e17fb3a42e43b1315c55c3f0c3
SHA2568aec0333a0b42c6a717c8a2dc6a2ce2b76dc806c6e1a4816cb51af9c5af55731
SHA512af5c23994c9a174efd1ac694dbc4aa2649eb8bb795701c8531d4b53d23a7d14ec9b1470b5250429771e8788c6fe7bf77bde549ee0655318777dc9b4ac7213215
-
Filesize
180B
MD5ad987a2b5dc3b33752f2894d296492a2
SHA1184c06307890c6c0fe1fe817450afdad2f93d6f5
SHA256bb73ec1ee003d13bfb56cfec559014ed77dd253c4558ad6c9f06da547c7f6f86
SHA5127960e19605fe87d79b4246d9c9913f8b4e2a9599cbceca119fb9ad3577e045ad8a911d916d9c50e53d40eb1ee0aeec78edf7e551f7cf46548fa6485e416dd783