Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 20:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
907e21e5c122b5a3126a86d7d02df4f6.exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
907e21e5c122b5a3126a86d7d02df4f6.exe
-
Size
54KB
-
MD5
907e21e5c122b5a3126a86d7d02df4f6
-
SHA1
031db700719b48c691116f5027d5609efc7c210f
-
SHA256
6fb2bda81d9edf6955e7d6bd5d9dfb5a0f3d7695eacd2a0e4f3988812ebf41cd
-
SHA512
d19076ef75e2c8ce85acf0b2a22b0aadbcdb945e56153a58dea52f068c23caf76e8673dc4012b23a511b32404193cd88cfaa4523509e5340d0f46d01322c05fc
-
SSDEEP
768:+pMsRVqvTtICYY5xbjVz6GPt5ToMHTuGeeU/OgUO90THf8CyTHf8C0mbt:GRVqv16eXTpHTuGj0Jx90T8HT8lmp
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1224-5-0x0000000006690000-0x00000000067A2000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\907e21e5c122b5a3126a86d7d02df4f6.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\907e21e5c122b5a3126a86d7d02df4f6.exe Powershell.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 2688 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1224 907e21e5c122b5a3126a86d7d02df4f6.exe Token: SeDebugPrivilege 2688 Powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2688 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 28 PID 1224 wrote to memory of 2688 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 28 PID 1224 wrote to memory of 2688 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 28 PID 1224 wrote to memory of 2688 1224 907e21e5c122b5a3126a86d7d02df4f6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\907e21e5c122b5a3126a86d7d02df4f6.exe"C:\Users\Admin\AppData\Local\Temp\907e21e5c122b5a3126a86d7d02df4f6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -exec bypass -c Copy-Item 'C:\Users\Admin\AppData\Local\Temp\907e21e5c122b5a3126a86d7d02df4f6.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\907e21e5c122b5a3126a86d7d02df4f6.exe' -Force2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-