Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 17:33

General

  • Target

    tmp.exe

  • Size

    2.7MB

  • MD5

    c45914bb84b2703e5bebe5a16945b168

  • SHA1

    0647b49184a37099e39c43556e8d0244909edef3

  • SHA256

    6d0b474f71319576e3781210487157ee50753f09e2bbe584a65c0b438971c984

  • SHA512

    6de8933a35dfcf99c57b5a37fcebcc5d72eab69b2db78b11af9174acd179edde2d226688ea8d114940a8762e46e8ebec63dbe9bcc4ac20385645c4341d681928

  • SSDEEP

    24576:p2oQPs1XwWHYdSA9CMjBALuxY4OPsW7LQ3IA/6oYESBJ+YavIz+q/pGzxLoO9uWQ:/2sihLjqqY4LWY3ITd9BJ+YaPcNO

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
      2⤵
        PID:960
    • C:\Users\Admin\AppData\Local\Temp\uosxncu.exe
      C:\Users\Admin\AppData\Local\Temp\uosxncu.exe
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        "Powershell.exe" -exec bypass -c Copy-Item 'C:\Users\Admin\AppData\Local\Temp\uosxncu.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uosxncu.exe' -Force
        2⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
      • C:\Users\Admin\AppData\Local\Temp\uosxncu.exe
        "C:\Users\Admin\AppData\Local\Temp\uosxncu.exe"
        2⤵
          PID:1012
        • C:\Users\Admin\AppData\Local\Temp\uosxncu.exe
          "C:\Users\Admin\AppData\Local\Temp\uosxncu.exe"
          2⤵
            PID:4628
          • C:\Users\Admin\AppData\Local\Temp\uosxncu.exe
            "C:\Users\Admin\AppData\Local\Temp\uosxncu.exe"
            2⤵
              PID:4988
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3896 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:2720

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lkzvhaut.vnu.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • memory/960-9-0x0000000071490000-0x00000000714A2000-memory.dmp

              Filesize

              72KB

            • memory/960-5-0x0000000000950000-0x00000000009EC000-memory.dmp

              Filesize

              624KB

            • memory/1648-14-0x00000000032A0000-0x00000000032B0000-memory.dmp

              Filesize

              64KB

            • memory/1648-18-0x00000000081D0000-0x00000000082E2000-memory.dmp

              Filesize

              1.1MB

            • memory/1648-11-0x00000000751C0000-0x0000000075970000-memory.dmp

              Filesize

              7.7MB

            • memory/1648-12-0x0000000005D20000-0x00000000062C4000-memory.dmp

              Filesize

              5.6MB

            • memory/1648-13-0x00000000056B0000-0x0000000005742000-memory.dmp

              Filesize

              584KB

            • memory/1648-68-0x00000000032A0000-0x00000000032B0000-memory.dmp

              Filesize

              64KB

            • memory/1648-15-0x0000000005690000-0x000000000569A000-memory.dmp

              Filesize

              40KB

            • memory/1648-10-0x0000000000DB0000-0x0000000000DC4000-memory.dmp

              Filesize

              80KB

            • memory/1648-19-0x0000000008580000-0x000000000861C000-memory.dmp

              Filesize

              624KB

            • memory/1648-22-0x0000000077BC1000-0x0000000077CE1000-memory.dmp

              Filesize

              1.1MB

            • memory/1648-66-0x00000000032A0000-0x00000000032B0000-memory.dmp

              Filesize

              64KB

            • memory/1648-52-0x00000000032A0000-0x00000000032B0000-memory.dmp

              Filesize

              64KB

            • memory/1648-50-0x00000000032A0000-0x00000000032B0000-memory.dmp

              Filesize

              64KB

            • memory/1648-40-0x00000000032A0000-0x00000000032B0000-memory.dmp

              Filesize

              64KB

            • memory/1648-39-0x00000000751C0000-0x0000000075970000-memory.dmp

              Filesize

              7.7MB

            • memory/2692-54-0x0000000006810000-0x000000000682A000-memory.dmp

              Filesize

              104KB

            • memory/2692-51-0x00000000063C0000-0x000000000640C000-memory.dmp

              Filesize

              304KB

            • memory/2692-28-0x0000000005C30000-0x0000000005C96000-memory.dmp

              Filesize

              408KB

            • memory/2692-23-0x0000000002D00000-0x0000000002D36000-memory.dmp

              Filesize

              216KB

            • memory/2692-59-0x00000000751C0000-0x0000000075970000-memory.dmp

              Filesize

              7.7MB

            • memory/2692-55-0x00000000072D0000-0x00000000072F2000-memory.dmp

              Filesize

              136KB

            • memory/2692-53-0x0000000006880000-0x0000000006916000-memory.dmp

              Filesize

              600KB

            • memory/2692-27-0x0000000005420000-0x0000000005442000-memory.dmp

              Filesize

              136KB

            • memory/2692-26-0x0000000005590000-0x0000000005BB8000-memory.dmp

              Filesize

              6.2MB

            • memory/2692-24-0x00000000751C0000-0x0000000075970000-memory.dmp

              Filesize

              7.7MB

            • memory/2692-46-0x0000000005D10000-0x0000000006064000-memory.dmp

              Filesize

              3.3MB

            • memory/2692-29-0x0000000005CA0000-0x0000000005D06000-memory.dmp

              Filesize

              408KB

            • memory/2692-25-0x0000000002D80000-0x0000000002D90000-memory.dmp

              Filesize

              64KB

            • memory/2692-49-0x0000000006300000-0x000000000631E000-memory.dmp

              Filesize

              120KB

            • memory/4740-2-0x00007FF746840000-0x00007FF746B54000-memory.dmp

              Filesize

              3.1MB

            • memory/4740-6-0x00007FF746840000-0x00007FF746B54000-memory.dmp

              Filesize

              3.1MB

            • memory/4988-65-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-35-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-41-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-37-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-36-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-64-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-48-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-38-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-67-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-47-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-71-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-72-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-77-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB

            • memory/4988-78-0x0000000000400000-0x0000000000445000-memory.dmp

              Filesize

              276KB