Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 04:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
23722503bdcc20ab9e6482bb2d3e92e50b13443799f361975bb36a91f0eeb895.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
23722503bdcc20ab9e6482bb2d3e92e50b13443799f361975bb36a91f0eeb895.exe
-
Size
717KB
-
MD5
ec88a4c1dcfb3861f6c9c364deeabd94
-
SHA1
ed0d81e041345ddc9ff9fea8bad197ee1a66fe82
-
SHA256
23722503bdcc20ab9e6482bb2d3e92e50b13443799f361975bb36a91f0eeb895
-
SHA512
81f6ed64f54778aa59afbc515dd6a40b5acac397348801dadbddcfdc15711144c3085e08099ba2a28a98055039916ade0e0cde1ea6fcf78b1f5962e8651609a7
-
SSDEEP
12288:rtHCL6YFXDk8fwYXzlRLf3AM+lsEttF2s9NgztG2Qk/sxJhT:xHq6Y5hRLsGEvF2sOtGkIh
Malware Config
Signatures
-
Detect ZGRat V1 28 IoCs
Processes:
resource yara_rule behavioral1/memory/2556-4-0x0000000000C60000-0x0000000000D04000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-5-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-6-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-8-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-10-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-12-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-14-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-20-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-18-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-22-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-24-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-26-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-28-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-30-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-32-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-34-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-36-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-38-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-40-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-42-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-44-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-46-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-48-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-50-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-52-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-54-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-56-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 behavioral1/memory/2556-16-0x0000000000C60000-0x0000000000CFE000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
23722503bdcc20ab9e6482bb2d3e92e50b13443799f361975bb36a91f0eeb895.exedescription pid process Token: SeDebugPrivilege 2556 23722503bdcc20ab9e6482bb2d3e92e50b13443799f361975bb36a91f0eeb895.exe