Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 12:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Cvdnacb.exe
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Cvdnacb.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
Cvdnacb.exe
-
Size
23KB
-
MD5
50e198816a25e6ceeaf4174413b7d1b3
-
SHA1
5509191f320424402266c02b9b6352aea32638f7
-
SHA256
748d3b47d1498c7bbf2205b98e8ed577f95872d980ac06baee0426d1c8b166ed
-
SHA512
c7149694fdbe892ebd8345970f848c0a54de294792b802dcd262c2e9370a4936dde56cd3184a0269377c9c9ee8c8bef62ae2526842ee1caf84696b64eb08f853
-
SSDEEP
384:M86Fw68yQDd5DY/5i49Rtj1sgw2bCoTBPmrQSpb+5S/2vHvrPQ:4vkITztmgXdST0PrPQ
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
103.153.182.247:6161
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/1228-3-0x0000000006200000-0x000000000646E000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-6-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-7-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-9-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-11-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-15-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-13-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-21-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-25-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-23-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-29-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-27-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-19-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-17-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-31-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-33-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-37-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-39-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-41-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-35-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-45-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-43-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-49-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-47-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-51-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-55-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-59-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-57-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-53-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-61-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-63-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-65-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-67-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 behavioral2/memory/1228-69-0x0000000006200000-0x0000000006467000-memory.dmp family_zgrat_v1 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wfldk.vbs Cvdnacb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Install name = "C:\\Users\\Admin\\AppData\\Local\\Install path\\Install name" Cvdnacb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4152 Cvdnacb.exe 4152 Cvdnacb.exe 4152 Cvdnacb.exe 4152 Cvdnacb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1228 set thread context of 4152 1228 Cvdnacb.exe 90 -
Suspicious behavior: RenamesItself 3 IoCs
pid Process 4152 Cvdnacb.exe 4152 Cvdnacb.exe 4152 Cvdnacb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1228 Cvdnacb.exe Token: SeShutdownPrivilege 4152 Cvdnacb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4152 Cvdnacb.exe 4152 Cvdnacb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90 PID 1228 wrote to memory of 4152 1228 Cvdnacb.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cvdnacb.exe"C:\Users\Admin\AppData\Local\Temp\Cvdnacb.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\Cvdnacb.exeC:\Users\Admin\AppData\Local\Temp\Cvdnacb.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4152
-