Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe
Resource
win10v2004-20231215-en
General
-
Target
8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe
-
Size
790KB
-
MD5
c8b4fb2984a495c19cc5d4dcc1922914
-
SHA1
bbc25258b543805926d034564015a2e4d40b0647
-
SHA256
8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78
-
SHA512
d084a9565d9cd7137969bc0cfb2dad3e2370451715dccf89906eafbb2ecbdf20bc8e654ff4aaa8facf5bd8931861f8e3df4cf5f1079431debadeff93b37c2205
-
SSDEEP
12288:T6tHgfBPsucbAapcfyTAKQrj86Hil5QaHRnxiWUotpA5Xturz1J+mZWwVVVVVVVX:T6tHwxEAapcaXBxRwWFtpAzs1IWb/T
Malware Config
Extracted
asyncrat
0.5.7B
TORREMENOR
danielballesterosdominper.con-ip.com:4040
Cookies
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/4316-2-0x0000000005040000-0x00000000050DC000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-3-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-4-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-6-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-8-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-10-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-12-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-14-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-16-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-18-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-20-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-22-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-24-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-26-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-28-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-32-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-30-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-34-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-36-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-38-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-40-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-42-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-44-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-46-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-48-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-50-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-52-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-54-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-56-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-58-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-60-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-62-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-64-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 behavioral2/memory/4316-66-0x0000000005040000-0x00000000050D5000-memory.dmp family_zgrat_v1 -
Detects file containing reversed ASEP Autorun registry keys 1 IoCs
resource yara_rule behavioral2/memory/4940-945-0x0000000000400000-0x0000000000412000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qxhmhuy = "C:\\Users\\Admin\\AppData\\Roaming\\Qxhmhuy.exe" 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4316 set thread context of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4316 wrote to memory of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90 PID 4316 wrote to memory of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90 PID 4316 wrote to memory of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90 PID 4316 wrote to memory of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90 PID 4316 wrote to memory of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90 PID 4316 wrote to memory of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90 PID 4316 wrote to memory of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90 PID 4316 wrote to memory of 4940 4316 8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe"C:\Users\Admin\AppData\Local\Temp\8545fedaeb113fdb4000b3f6a8d0f0f4694f9198203086a7d1230385a5180f78.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵PID:4940
-