Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 23:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe
Resource
win7-20240220-en
General
-
Target
c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe
-
Size
1017KB
-
MD5
02d49663964ca14885477e43bb4d8538
-
SHA1
4bfef39721918c796c5ccdd19f0fba421c4fc937
-
SHA256
c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817
-
SHA512
6d89d0a58963b9f6ed520deac1c06008b23a575f461283eb3ed2896a6372bb381e41e4c0a51f657cdb64500eea1ec5d51ec787de22d092e79101efd96fb7da0b
-
SSDEEP
12288:Y6wnpkQlkkaFIpiiXnXTVCRIaDQ2UtaQwXydUjSZv8PogcM+SwgT6AQSQy4A:Hgbg0nXoR429XTe4mNAtQy4A
Malware Config
Extracted
formbook
pp0t
c9tSf4QHOwJjLbRfkwuwURujn/iH
pq54GqPOHu8U
WeXPb9LyJlOEMnTHjmv+O95VTnX7KA==
U18lwwKHPkJlZ3+u/e3h/zvV
ADj7RlmLOuc5QNhAHo4lWQ==
ifzvnDteMx0b
PmEpuAehVVp1QZV1JIY=
Ab+SQKRM4d7ZidIlwu2y6jTS
iAjigMrD+xQL9IoeDlPm+sY=
XisFVVjH25z9z6jrg3f8OMMHxHxf9Tw=
BeXeBZq31ouzxg==
ysN9oYfOHu8U
ml8KIinPAMgRuTe7fY4=
voMdjO13pzDNk1Q=
/PrtkRtASgyodEc=
Z3UEHTRRgXWhra71DkSvoZrd
qXE75D5v82lO/2hF4vSZ15hMD3dg3Bl4Kw==
x8m0Yaa4x7stHrsS5o7BWw==
0thWfXqJu6Rn/9AZRQ==
/ndSqtQFQYq+qicJodEHK90=
gOWbK15kyImWakM=
qOdRSLHElNcq/9AZRQ==
BlUvfFnxPvdsYFlw0/Ym
hHnxLWGvoI2yydwrRG7vLKv7Ybk=
xtirNYAQQJqYTBJxMzvljZfk4065IfaQNg==
ZWlJ1B+hPEVD9vWeuRYj
sGcMT6BFYymNY0Cux2HC/cQ=
RTnhOGZ6p5qKZFhw0/Ym
xjX6m/oVSIrwcEA=
KhPDXbnI1IWffkY=
aBjTHfgDIGK+N7skRw==
sfeXpZ235hxschdvdtoQfDqPyw==
6d/BUZGy4dK7IpfoWKTVfy7V
RwGZ5hyup2NXB1twxLAgVA==
nxPqOjU7aZ/i4lahvho/caDuFbuP
JS0VYncZRaOy2KXPdYCgSA==
dhGhv+aCiUKVTAZUGGHC/cQ=
LEm2vtgMOx1s+tCr
kioHnsBgAyy4b2JMUg==
o1fsPHx71ouzxg==
KY5JlZKzXzhvZWdB/0ivoZrd
8Q+Q0ifUg3D1nl4=
dmPfMnmPrJOMY1hw0/Ym
IKMwiM3NdyS4G+HUyiA7
QZ9isNcFO4/k+ouu1mHC/cQ=
mpordq/P9CJNPs4U4oChSA==
/50XmtDf++/zpeZw0/Ym
eE/9GjJw1ouzxg==
/3HsNHshON1OyMktPnGcTA==
rBWQrsyNOT0q3rfgU2WcTA==
+imT7jHA4aAIsbWp
9O9XbEnh1ouzxg==
bWn3DSJCg3D1nl4=
IZ9/wL/D5CZpCDaNfPSHujwOww==
vc6pCMgG+ekD
a0XO/xA610dgY+6Igb+1Uw==
vqgmcrdFABVs+tCr
e5kvMSrtJJuomUbgU2WcTA==
WIAmdIK2XdU+GJpsDyPcjYPD
43tG0zhy1ouzxg==
1w2txr/B6tfYjFlw0/Ym
DgvwlN8NOR1s+tCr
kam6brkG+ekD
HotYqKCYtMu/bzCUo8g/0deV1Q==
inthecryptolane.com
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2836-7-0x0000000005CE0000-0x0000000005D6E000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2836 set thread context of 2332 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2148 powershell.exe 2016 powershell.exe 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 2332 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe Token: SeDebugPrivilege 2148 powershell.exe Token: SeDebugPrivilege 2016 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2016 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 30 PID 2836 wrote to memory of 2016 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 30 PID 2836 wrote to memory of 2016 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 30 PID 2836 wrote to memory of 2016 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 30 PID 2836 wrote to memory of 2148 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 32 PID 2836 wrote to memory of 2148 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 32 PID 2836 wrote to memory of 2148 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 32 PID 2836 wrote to memory of 2148 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 32 PID 2836 wrote to memory of 320 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 34 PID 2836 wrote to memory of 320 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 34 PID 2836 wrote to memory of 320 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 34 PID 2836 wrote to memory of 320 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 34 PID 2836 wrote to memory of 2332 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 36 PID 2836 wrote to memory of 2332 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 36 PID 2836 wrote to memory of 2332 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 36 PID 2836 wrote to memory of 2332 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 36 PID 2836 wrote to memory of 2332 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 36 PID 2836 wrote to memory of 2332 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 36 PID 2836 wrote to memory of 2332 2836 c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe"C:\Users\Admin\AppData\Local\Temp\c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wegDzXR.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wegDzXR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4173.tmp"2⤵
- Creates scheduled task(s)
PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe"C:\Users\Admin\AppData\Local\Temp\c1bd96883587818b3cb169701f342d982a3a785164ef9261a70a49043f7f6817.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD527aad7613b3b73d7b9c7a446195106ee
SHA13c0e7a8d8dcfff7dc6152e4ddb45a978cd516844
SHA256ba6d6121b943eed5aed85ad90d5eb19bdece7ca670dafab024d6062f9e9fbc7f
SHA512b27ee4f82b7fc4455c5e3158cdb161cf5f38b098fef2b58601b1785c3d6dc6f9d52ce24c7d8bff824de392fbb052f6fa84e1a5c5d2990b168421f0b2493fcf59
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD553f02d38b6ef063c9e407b5657dd4518
SHA11632fa038ca1d127babf86698975332ff7aea0d7
SHA2568c644938d0ca3ac00cd53cf2b439ae6dde99b5e28accf1c89bf0a4b24b98cc52
SHA51287fe376109721d70377f27372858b1e541f166215b6f452c21b5583c1f0f34e22f57350ddb4004d785f195509b96c0aa28b07e7bfb180e9229a1d6a045f85cdc