Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 17:38

General

  • Target

    file.exe

  • Size

    1.5MB

  • MD5

    0c52d0355c15ed92930c645c340a1edb

  • SHA1

    8bfdafa0aa3403c52bf115667833734c4c409581

  • SHA256

    c122084a42b99f006a27e9c48d7098e192704183d3a5dfd57f924c03ae506552

  • SHA512

    7889df8248c8b003b1d9d900bd15b5b215a3fca1f2d783c7f4ffedd6c09143970b7ab217dc3080de6b66c463331776283fc0c3711974eef77e02fea82aafe862

  • SSDEEP

    24576:W4+ufew4vRRm5JjP++3jDSpLHnT3s++Gg0w38LzAqSSiKLWWW9GCdh:W46wV6pLnE3+8Giy5Wt3

Malware Config

Signatures

  • Detect ZGRat V1 30 IoCs
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • ModiLoader Second Stage 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\RdvbwtmdO.bat" "
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c mkdir "\\?\C:\Windows "
        3⤵
          PID:3468
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
          3⤵
            PID:2968
          • C:\Windows\SysWOW64\xcopy.exe
            xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
            3⤵
            • Enumerates system info in registry
            PID:2900
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
            3⤵
              PID:3516
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
              3⤵
              • Enumerates system info in registry
              PID:4428
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
              3⤵
                PID:2832
              • C:\Windows\SysWOW64\xcopy.exe
                xcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y
                3⤵
                • Enumerates system info in registry
                PID:2316
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                3⤵
                  PID:1888
                • C:\Windows\SysWOW64\xcopy.exe
                  xcopy "x.bat" "C:\Windows \System32\" /K /D /H /Y
                  3⤵
                  • Enumerates system info in registry
                  PID:2848
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c "C:\\Windows \\System32\\easinvoker.exe"
                2⤵
                • Checks computer location settings
                • Suspicious use of SetWindowsHookEx
                PID:1568
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\file.exe C:\\Users\\Public\\Libraries\\Rdvbwtmd.PIF
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:868
                • C:\Windows\SysWOW64\extrac32.exe
                  extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\file.exe C:\\Users\\Public\\Libraries\\Rdvbwtmd.PIF
                  3⤵
                    PID:3440
                • C:\Users\Public\Libraries\dmtwbvdR.pif
                  C:\Users\Public\Libraries\dmtwbvdR.pif
                  2⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4708

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Public\Libraries\KDECO.bat

                      Filesize

                      4KB

                      MD5

                      785e8193007bcd7858b9df41c9d45f89

                      SHA1

                      29b206de05ab075138ca9e0b9fccdddf3c30cdfe

                      SHA256

                      c8e1912a3328802e98563e32eb053ae3e28249b701054af227e9f1ba6bfe24d9

                      SHA512

                      a4d6fd586800f27939d8c152e89d2a231dc9fd8466e715dfeba22e2aa0428509095e12e6e66f2cb5e40ff5c998b439dc3f6792e20c179f41ac9cae31ada9d45f

                    • C:\Users\Public\Libraries\RdvbwtmdO.bat

                      Filesize

                      7KB

                      MD5

                      0d0d24b46d4bb0e4962595d455020d48

                      SHA1

                      48b247c1cb2577b28aabd7dfa999e0642b5dc6de

                      SHA256

                      f46e0cc2c119a32dd87edf97bfc73d985ee97d2c9dc00274b6b20d641e29deea

                      SHA512

                      d5a8779e1cfd2a284173ce8a205cacb41fc7c744fa84e55682ac50b327c676ff50f668ecd176e0ab84420d143a8023d8b4590362b223704c55f5b0d7e116ba2c

                    • C:\Users\Public\Libraries\dmtwbvdR.pif

                      Filesize

                      66KB

                      MD5

                      c116d3604ceafe7057d77ff27552c215

                      SHA1

                      452b14432fb5758b46f2897aeccd89f7c82a727d

                      SHA256

                      7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

                      SHA512

                      9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

                    • C:\Users\Public\Libraries\easinvoker.exe

                      Filesize

                      116KB

                      MD5

                      ef43f3e84500f2528ff56b144c07c8a2

                      SHA1

                      f56579f77ad20ebea21025a215e6ffaf7637b3b4

                      SHA256

                      4e7d74a4890af9128e04c758d8e5fa9488ff22da64979725b26fcb0e8806e6f5

                      SHA512

                      a6c509bb881f2098460e24d8d9db5e8ed9900b3afa9e3a84752b550c41f3f367e875578abc4cf72a4fe313c03793426837e28886b5029e8d153613d38a3f7138

                    • C:\Users\Public\Libraries\netutils.dll

                      Filesize

                      115KB

                      MD5

                      7b204fe717f1d0e74986ce551d86e0b3

                      SHA1

                      f895f27eabb834ab8947a6f6f4dd3a1e38a32c54

                      SHA256

                      4b186952d56dddacaf1738c1b268a62acb12cbf472fbf1a6083a49be0f9ef03d

                      SHA512

                      9e9c88b0501708d501242aa4944de6e0d8481196babfb8444ad426b58326ad5bb46e43c372069b96784560db55e3fc04a264fbd701e7ec0535ac2816a65e83ec

                    • memory/2556-0-0x0000000000640000-0x0000000000641000-memory.dmp

                      Filesize

                      4KB

                    • memory/2556-1-0x0000000002900000-0x0000000003900000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/2556-2-0x0000000002900000-0x0000000003900000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/2556-4-0x0000000000400000-0x0000000000583000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/2556-21-0x0000000000640000-0x0000000000641000-memory.dmp

                      Filesize

                      4KB

                    • memory/4708-63-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-72-0x0000000040360000-0x0000000040370000-memory.dmp

                      Filesize

                      64KB

                    • memory/4708-30-0x0000000000400000-0x0000000001400000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4708-31-0x0000000040220000-0x000000004027E000-memory.dmp

                      Filesize

                      376KB

                    • memory/4708-36-0x0000000040300000-0x000000004035C000-memory.dmp

                      Filesize

                      368KB

                    • memory/4708-35-0x0000000040370000-0x0000000040914000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/4708-37-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-38-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-40-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-42-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-44-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-46-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-48-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-49-0x0000000000400000-0x0000000001400000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4708-51-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-53-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-55-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-57-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-59-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-61-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-25-0x0000000000400000-0x0000000001400000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4708-65-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-67-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-69-0x0000000040360000-0x0000000040370000-memory.dmp

                      Filesize

                      64KB

                    • memory/4708-71-0x0000000040360000-0x0000000040370000-memory.dmp

                      Filesize

                      64KB

                    • memory/4708-28-0x0000000000400000-0x0000000001400000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4708-70-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-74-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-76-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-78-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-81-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-80-0x0000000071300000-0x0000000071AB0000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4708-83-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-89-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-87-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-85-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-91-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-93-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-95-0x0000000040300000-0x0000000040356000-memory.dmp

                      Filesize

                      344KB

                    • memory/4708-1162-0x0000000040A20000-0x0000000040A86000-memory.dmp

                      Filesize

                      408KB

                    • memory/4708-1163-0x0000000040360000-0x0000000040370000-memory.dmp

                      Filesize

                      64KB

                    • memory/4708-1166-0x0000000041A20000-0x0000000041A70000-memory.dmp

                      Filesize

                      320KB

                    • memory/4708-1167-0x0000000041A70000-0x0000000041B0C000-memory.dmp

                      Filesize

                      624KB

                    • memory/4708-1169-0x0000000041BB0000-0x0000000041C42000-memory.dmp

                      Filesize

                      584KB

                    • memory/4708-1170-0x0000000041CD0000-0x0000000041CDA000-memory.dmp

                      Filesize

                      40KB

                    • memory/4708-1172-0x0000000040360000-0x0000000040370000-memory.dmp

                      Filesize

                      64KB

                    • memory/4708-1173-0x0000000040360000-0x0000000040370000-memory.dmp

                      Filesize

                      64KB

                    • memory/4708-1174-0x0000000040360000-0x0000000040370000-memory.dmp

                      Filesize

                      64KB

                    • memory/4708-1175-0x0000000071300000-0x0000000071AB0000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4708-1177-0x0000000040360000-0x0000000040370000-memory.dmp

                      Filesize

                      64KB