Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 11:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a64609feb0d9955ae617f71141225cba.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
a64609feb0d9955ae617f71141225cba.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
a64609feb0d9955ae617f71141225cba.exe
-
Size
818KB
-
MD5
a64609feb0d9955ae617f71141225cba
-
SHA1
b4a16cda26aad808b1206b683ebce9ec82005a07
-
SHA256
5dabf8a97f60ebb9c51e86fc57888989511adf92cfb478c9f7a85cb152c232b2
-
SHA512
471c68d7a9789e35255cb09dd4a407642bf655d5543d2991ff4ae8721ec97495907f71bb3fc7692368984246b372ab7ee4a5ba12304e3c259959301a3e60141a
-
SSDEEP
12288:KfZFuKzFV3ahKIQGraTQBBZepucskf1GcdB1U03Fl89dHu:Ug63ahdqa7Qf1G4U03G0
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2144-7-0x0000000008150000-0x00000000081BC000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-8-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-9-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-11-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-13-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-15-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-17-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-19-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-21-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-23-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-25-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-27-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-31-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-33-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-35-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-37-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-29-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-39-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-41-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-43-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-45-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-47-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-49-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-51-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-55-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-53-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-57-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-59-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-61-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-63-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-65-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-67-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-69-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2144-71-0x0000000008150000-0x00000000081B6000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\suh = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\chrsg\\suh.exe\"" a64609feb0d9955ae617f71141225cba.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe 2144 a64609feb0d9955ae617f71141225cba.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 a64609feb0d9955ae617f71141225cba.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2372 2144 a64609feb0d9955ae617f71141225cba.exe 30 PID 2144 wrote to memory of 2372 2144 a64609feb0d9955ae617f71141225cba.exe 30 PID 2144 wrote to memory of 2372 2144 a64609feb0d9955ae617f71141225cba.exe 30 PID 2144 wrote to memory of 2372 2144 a64609feb0d9955ae617f71141225cba.exe 30 PID 2144 wrote to memory of 2444 2144 a64609feb0d9955ae617f71141225cba.exe 31 PID 2144 wrote to memory of 2444 2144 a64609feb0d9955ae617f71141225cba.exe 31 PID 2144 wrote to memory of 2444 2144 a64609feb0d9955ae617f71141225cba.exe 31 PID 2144 wrote to memory of 2444 2144 a64609feb0d9955ae617f71141225cba.exe 31 PID 2144 wrote to memory of 2592 2144 a64609feb0d9955ae617f71141225cba.exe 32 PID 2144 wrote to memory of 2592 2144 a64609feb0d9955ae617f71141225cba.exe 32 PID 2144 wrote to memory of 2592 2144 a64609feb0d9955ae617f71141225cba.exe 32 PID 2144 wrote to memory of 2592 2144 a64609feb0d9955ae617f71141225cba.exe 32 PID 2144 wrote to memory of 1528 2144 a64609feb0d9955ae617f71141225cba.exe 33 PID 2144 wrote to memory of 1528 2144 a64609feb0d9955ae617f71141225cba.exe 33 PID 2144 wrote to memory of 1528 2144 a64609feb0d9955ae617f71141225cba.exe 33 PID 2144 wrote to memory of 1528 2144 a64609feb0d9955ae617f71141225cba.exe 33 PID 2144 wrote to memory of 552 2144 a64609feb0d9955ae617f71141225cba.exe 34 PID 2144 wrote to memory of 552 2144 a64609feb0d9955ae617f71141225cba.exe 34 PID 2144 wrote to memory of 552 2144 a64609feb0d9955ae617f71141225cba.exe 34 PID 2144 wrote to memory of 552 2144 a64609feb0d9955ae617f71141225cba.exe 34 PID 2144 wrote to memory of 388 2144 a64609feb0d9955ae617f71141225cba.exe 35 PID 2144 wrote to memory of 388 2144 a64609feb0d9955ae617f71141225cba.exe 35 PID 2144 wrote to memory of 388 2144 a64609feb0d9955ae617f71141225cba.exe 35 PID 2144 wrote to memory of 388 2144 a64609feb0d9955ae617f71141225cba.exe 35 PID 2144 wrote to memory of 1156 2144 a64609feb0d9955ae617f71141225cba.exe 36 PID 2144 wrote to memory of 1156 2144 a64609feb0d9955ae617f71141225cba.exe 36 PID 2144 wrote to memory of 1156 2144 a64609feb0d9955ae617f71141225cba.exe 36 PID 2144 wrote to memory of 1156 2144 a64609feb0d9955ae617f71141225cba.exe 36 PID 2144 wrote to memory of 860 2144 a64609feb0d9955ae617f71141225cba.exe 37 PID 2144 wrote to memory of 860 2144 a64609feb0d9955ae617f71141225cba.exe 37 PID 2144 wrote to memory of 860 2144 a64609feb0d9955ae617f71141225cba.exe 37 PID 2144 wrote to memory of 860 2144 a64609feb0d9955ae617f71141225cba.exe 37 PID 2144 wrote to memory of 1932 2144 a64609feb0d9955ae617f71141225cba.exe 38 PID 2144 wrote to memory of 1932 2144 a64609feb0d9955ae617f71141225cba.exe 38 PID 2144 wrote to memory of 1932 2144 a64609feb0d9955ae617f71141225cba.exe 38 PID 2144 wrote to memory of 1932 2144 a64609feb0d9955ae617f71141225cba.exe 38 PID 2144 wrote to memory of 2328 2144 a64609feb0d9955ae617f71141225cba.exe 39 PID 2144 wrote to memory of 2328 2144 a64609feb0d9955ae617f71141225cba.exe 39 PID 2144 wrote to memory of 2328 2144 a64609feb0d9955ae617f71141225cba.exe 39 PID 2144 wrote to memory of 2328 2144 a64609feb0d9955ae617f71141225cba.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe"C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:388
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exeC:\Users\Admin\AppData\Local\Temp\a64609feb0d9955ae617f71141225cba.exe2⤵PID:2328
-