Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 12:41
Static task
static1
Behavioral task
behavioral1
Sample
Cvdnacb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cvdnacb.exe
Resource
win10v2004-20240221-en
General
-
Target
Cvdnacb.exe
-
Size
23KB
-
MD5
50e198816a25e6ceeaf4174413b7d1b3
-
SHA1
5509191f320424402266c02b9b6352aea32638f7
-
SHA256
748d3b47d1498c7bbf2205b98e8ed577f95872d980ac06baee0426d1c8b166ed
-
SHA512
c7149694fdbe892ebd8345970f848c0a54de294792b802dcd262c2e9370a4936dde56cd3184a0269377c9c9ee8c8bef62ae2526842ee1caf84696b64eb08f853
-
SSDEEP
384:M86Fw68yQDd5DY/5i49Rtj1sgw2bCoTBPmrQSpb+5S/2vHvrPQ:4vkITztmgXdST0PrPQ
Malware Config
Extracted
bitrat
1.38
103.153.182.247:6161
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral2/memory/1228-3-0x0000000006200000-0x000000000646E000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-6-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-7-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-9-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-11-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-15-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-13-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-21-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-25-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-23-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-29-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-27-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-19-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-17-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-31-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-33-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-37-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-39-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-41-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-35-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-45-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-43-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-49-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-47-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-51-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-55-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-59-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-57-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-53-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-61-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-63-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-65-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-67-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-69-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 -
Drops startup file 1 IoCs
Processes:
Cvdnacb.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wfldk.vbs Cvdnacb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Cvdnacb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Install name = "C:\\Users\\Admin\\AppData\\Local\\Install path\\Install name" Cvdnacb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
Cvdnacb.exepid process 4152 Cvdnacb.exe 4152 Cvdnacb.exe 4152 Cvdnacb.exe 4152 Cvdnacb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Cvdnacb.exedescription pid process target process PID 1228 set thread context of 4152 1228 Cvdnacb.exe Cvdnacb.exe -
Suspicious behavior: RenamesItself 3 IoCs
Processes:
Cvdnacb.exepid process 4152 Cvdnacb.exe 4152 Cvdnacb.exe 4152 Cvdnacb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Cvdnacb.exeCvdnacb.exedescription pid process Token: SeDebugPrivilege 1228 Cvdnacb.exe Token: SeShutdownPrivilege 4152 Cvdnacb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Cvdnacb.exepid process 4152 Cvdnacb.exe 4152 Cvdnacb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Cvdnacb.exedescription pid process target process PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe Cvdnacb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cvdnacb.exe"C:\Users\Admin\AppData\Local\Temp\Cvdnacb.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\Cvdnacb.exeC:\Users\Admin\AppData\Local\Temp\Cvdnacb.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4152
-