Resubmissions

27-02-2024 15:25

240227-stkjgacg5s 10

27-02-2024 15:21

240227-srp16scc78 10

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2024 15:25

General

  • Target

    a97ccd364ed034769bd7a0e41d823ebf.exe

  • Size

    754KB

  • MD5

    a97ccd364ed034769bd7a0e41d823ebf

  • SHA1

    ca4e9380a6ac5fe37d204cc055fb7f63cf764383

  • SHA256

    d6390558e6f860877f95e6cf83ebc2fa028da6f469d75f73b27afe92900fbc7f

  • SHA512

    b9c716b17d105a97cd161f9585e3b69a9b4b40091bb07c5e0cef79a257bb26a5076a58a649b4db6bb0a67990d980292df657b4187ff348a66748355a18699770

  • SSDEEP

    12288:Nte7/9xRNdnCGjIz8L4frvaRHELXq24z3P8cUdKFoUU5Czd0/FU1F3:uf9nXIoL4frSELq1LP84dU5CJ0/w

Malware Config

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a97ccd364ed034769bd7a0e41d823ebf.exe
    "C:\Users\Admin\AppData\Local\Temp\a97ccd364ed034769bd7a0e41d823ebf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Write-Output Hello World
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2492
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Write-Output Hello World
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\a97ccd364ed034769bd7a0e41d823ebf.exe" -Force
      2⤵
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:816
    • C:\Users\Admin\AppData\Local\Temp\a97ccd364ed034769bd7a0e41d823ebf.exe
      C:\Users\Admin\AppData\Local\Temp\a97ccd364ed034769bd7a0e41d823ebf.exe
      2⤵
        PID:2360
      • C:\Users\Admin\AppData\Local\Temp\a97ccd364ed034769bd7a0e41d823ebf.exe
        C:\Users\Admin\AppData\Local\Temp\a97ccd364ed034769bd7a0e41d823ebf.exe
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      ca60e15977510af9e8e60ab2b42de954

      SHA1

      d39d2a415d5c6de38492c5c59496d4421766c8a3

      SHA256

      4be1affd67caecb3dba8b14590d8cdfce95c9a1f374099f2c3ed183efdb1efb6

      SHA512

      46b4ec9e1753d3dfc4febefa101d35ec3470558d3351c1ed7ac641cd8d6db949d69f0ca1241ed4cdb7a7850c5555d50b83eb87f052fc83d40df3ba59f861cc9f

    • memory/816-2034-0x000000006F530000-0x000000006FADB000-memory.dmp

      Filesize

      5.7MB

    • memory/816-2028-0x0000000002ED0000-0x0000000002F10000-memory.dmp

      Filesize

      256KB

    • memory/816-2025-0x000000006F530000-0x000000006FADB000-memory.dmp

      Filesize

      5.7MB

    • memory/816-2027-0x0000000002ED0000-0x0000000002F10000-memory.dmp

      Filesize

      256KB

    • memory/816-2024-0x0000000002ED0000-0x0000000002F10000-memory.dmp

      Filesize

      256KB

    • memory/816-2023-0x000000006F530000-0x000000006FADB000-memory.dmp

      Filesize

      5.7MB

    • memory/1248-2033-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/1248-2032-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/1968-72-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-50-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-23-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-24-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-26-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-38-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-46-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-56-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-58-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-64-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-68-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-80-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-86-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-84-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-82-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-78-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-76-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-74-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-1-0x0000000074640000-0x0000000074D2E000-memory.dmp

      Filesize

      6.9MB

    • memory/1968-70-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-66-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-62-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-60-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-54-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-52-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-0-0x0000000000090000-0x0000000000152000-memory.dmp

      Filesize

      776KB

    • memory/1968-48-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-44-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-42-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-40-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-36-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-34-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-32-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-30-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-28-0x0000000008290000-0x00000000082F3000-memory.dmp

      Filesize

      396KB

    • memory/1968-2-0x0000000004580000-0x00000000045C0000-memory.dmp

      Filesize

      256KB

    • memory/1968-18-0x0000000074640000-0x0000000074D2E000-memory.dmp

      Filesize

      6.9MB

    • memory/1968-22-0x0000000008290000-0x00000000082F8000-memory.dmp

      Filesize

      416KB

    • memory/1968-2026-0x0000000074640000-0x0000000074D2E000-memory.dmp

      Filesize

      6.9MB

    • memory/1968-21-0x0000000008570000-0x0000000008612000-memory.dmp

      Filesize

      648KB

    • memory/1968-19-0x0000000004580000-0x00000000045C0000-memory.dmp

      Filesize

      256KB

    • memory/2492-5-0x000000006F890000-0x000000006FE3B000-memory.dmp

      Filesize

      5.7MB

    • memory/2492-6-0x0000000000300000-0x0000000000340000-memory.dmp

      Filesize

      256KB

    • memory/2492-8-0x0000000000300000-0x0000000000340000-memory.dmp

      Filesize

      256KB

    • memory/2492-7-0x000000006F890000-0x000000006FE3B000-memory.dmp

      Filesize

      5.7MB

    • memory/2492-9-0x000000006F890000-0x000000006FE3B000-memory.dmp

      Filesize

      5.7MB

    • memory/2624-15-0x000000006F5E0000-0x000000006FB8B000-memory.dmp

      Filesize

      5.7MB

    • memory/2624-16-0x000000006F5E0000-0x000000006FB8B000-memory.dmp

      Filesize

      5.7MB

    • memory/2624-17-0x000000006F5E0000-0x000000006FB8B000-memory.dmp

      Filesize

      5.7MB