Analysis

  • max time kernel
    89s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 05:12

General

  • Target

    WmiPrvSE.exe

  • Size

    1.9MB

  • MD5

    d67f722b73a3cbef568a2e3124a4bc04

  • SHA1

    27e0a75a646fb2869b31eab2f34f1de4db7e35e6

  • SHA256

    b83aed8214e0f95cb74b9b2bbc49b16bd46cc46a9ec620a4ab1a3ddbde34c303

  • SHA512

    c050652f2b11f4ad3ff9832f894ae6ada16400c41576b64e9bcfa2b785f15987b7d846f9bb597c4495edad91b4c67a8d601d5757afee39ed890148461f6de9bb

  • SSDEEP

    24576:AEtP/SRdxjxY8eCpDbZXvSBNOjABV+m/dynu46+I9KTVQpeeKghOb7XYFtRKdcaB:rj8ZbkNF0m/0vV1eKghUYFtML/sJ

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\WmiPrvSE.exe
    "C:\Users\Admin\AppData\Local\Temp\WmiPrvSE.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yslbGAH7fW.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4124
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:844
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:4696
          • C:\Program Files (x86)\Windows Multimedia Platform\lsass.exe
            "C:\Program Files (x86)\Windows Multimedia Platform\lsass.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1440
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\Update\Download\RuntimeBroker.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:3156
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Download\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:4364
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Google\Update\Download\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2864
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\lsass.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:3504
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2284
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1420
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\fontdrvhost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2232
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\fontdrvhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1932
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\fontdrvhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:432
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\lsass.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1748
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Admin\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:4952
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2744
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\odt\TextInputHost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2828
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\odt\TextInputHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:4040
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\odt\TextInputHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:840

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\yslbGAH7fW.bat

        Filesize

        236B

        MD5

        b5dda3d2a2834e4be8da535ac288d1aa

        SHA1

        b51f708787f76cb3f47722fc6573015e992f63a1

        SHA256

        ef2f77d67e4b625debf824e5980e888b912373df03e2a9f0ff84e7f694b33d2e

        SHA512

        2bc35906f9fd22c40a74a1292e9d5716de6fbdaaf125dfa317a7659e75a6a579febd4b9c5850fc229da527b804ff33891abd38b70034f3e70a63f17c68f0d412

      • C:\odt\TextInputHost.exe

        Filesize

        1.9MB

        MD5

        d67f722b73a3cbef568a2e3124a4bc04

        SHA1

        27e0a75a646fb2869b31eab2f34f1de4db7e35e6

        SHA256

        b83aed8214e0f95cb74b9b2bbc49b16bd46cc46a9ec620a4ab1a3ddbde34c303

        SHA512

        c050652f2b11f4ad3ff9832f894ae6ada16400c41576b64e9bcfa2b785f15987b7d846f9bb597c4495edad91b4c67a8d601d5757afee39ed890148461f6de9bb

      • memory/1348-21-0x00000000030E0000-0x00000000030EE000-memory.dmp

        Filesize

        56KB

      • memory/1348-25-0x00007FF8BB4E0000-0x00007FF8BB4E1000-memory.dmp

        Filesize

        4KB

      • memory/1348-5-0x0000000002F30000-0x0000000002F3E000-memory.dmp

        Filesize

        56KB

      • memory/1348-6-0x00007FF8BB540000-0x00007FF8BB5FE000-memory.dmp

        Filesize

        760KB

      • memory/1348-7-0x00007FF8BB530000-0x00007FF8BB531000-memory.dmp

        Filesize

        4KB

      • memory/1348-8-0x000000001BBC0000-0x000000001BBD0000-memory.dmp

        Filesize

        64KB

      • memory/1348-9-0x00007FF8BB540000-0x00007FF8BB5FE000-memory.dmp

        Filesize

        760KB

      • memory/1348-12-0x00007FF8BB520000-0x00007FF8BB521000-memory.dmp

        Filesize

        4KB

      • memory/1348-11-0x00000000030F0000-0x000000000310C000-memory.dmp

        Filesize

        112KB

      • memory/1348-13-0x000000001BB50000-0x000000001BBA0000-memory.dmp

        Filesize

        320KB

      • memory/1348-16-0x00007FF8BB510000-0x00007FF8BB511000-memory.dmp

        Filesize

        4KB

      • memory/1348-15-0x000000001BB00000-0x000000001BB18000-memory.dmp

        Filesize

        96KB

      • memory/1348-18-0x00000000030D0000-0x00000000030DE000-memory.dmp

        Filesize

        56KB

      • memory/1348-19-0x00007FF8BB500000-0x00007FF8BB501000-memory.dmp

        Filesize

        4KB

      • memory/1348-0-0x0000000000CB0000-0x0000000000EA2000-memory.dmp

        Filesize

        1.9MB

      • memory/1348-22-0x00007FF8BB4F0000-0x00007FF8BB4F1000-memory.dmp

        Filesize

        4KB

      • memory/1348-3-0x000000001BBC0000-0x000000001BBD0000-memory.dmp

        Filesize

        64KB

      • memory/1348-2-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

        Filesize

        4KB

      • memory/1348-24-0x0000000003110000-0x000000000311E000-memory.dmp

        Filesize

        56KB

      • memory/1348-42-0x00007FF89CE00000-0x00007FF89D8C1000-memory.dmp

        Filesize

        10.8MB

      • memory/1348-43-0x00007FF8BB540000-0x00007FF8BB5FE000-memory.dmp

        Filesize

        760KB

      • memory/1348-1-0x00007FF89CE00000-0x00007FF89D8C1000-memory.dmp

        Filesize

        10.8MB

      • memory/1440-48-0x00007FF89CD50000-0x00007FF89D811000-memory.dmp

        Filesize

        10.8MB

      • memory/1440-49-0x000000001B480000-0x000000001B481000-memory.dmp

        Filesize

        4KB

      • memory/1440-51-0x00007FF8BB540000-0x00007FF8BB5FE000-memory.dmp

        Filesize

        760KB

      • memory/1440-52-0x00007FF8BB530000-0x00007FF8BB531000-memory.dmp

        Filesize

        4KB

      • memory/1440-53-0x00007FF8BB520000-0x00007FF8BB521000-memory.dmp

        Filesize

        4KB

      • memory/1440-57-0x00007FF8BB510000-0x00007FF8BB511000-memory.dmp

        Filesize

        4KB

      • memory/1440-58-0x00007FF8BB500000-0x00007FF8BB501000-memory.dmp

        Filesize

        4KB

      • memory/1440-59-0x00007FF8BB4F0000-0x00007FF8BB4F1000-memory.dmp

        Filesize

        4KB

      • memory/1440-62-0x00007FF8BB4E0000-0x00007FF8BB4E1000-memory.dmp

        Filesize

        4KB

      • memory/1440-63-0x00007FF89CD50000-0x00007FF89D811000-memory.dmp

        Filesize

        10.8MB

      • memory/1440-64-0x00007FF8BB540000-0x00007FF8BB5FE000-memory.dmp

        Filesize

        760KB