Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 00:17
Behavioral task
behavioral1
Sample
6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
300 seconds
General
-
Target
6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe
-
Size
530KB
-
MD5
756931963ef47d8261e3090770710355
-
SHA1
074e49a53dc0dea819a2ce9b487982f0ac114d86
-
SHA256
6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf
-
SHA512
231458212051567f7549a7d24d0d956219e33480fbba3428b2259d571265802aa9b8727998f6c5bf62e30c1ec673619506b5cb9d1220c738af0685be2ec397ce
-
SSDEEP
12288:6L8s73bmtO4RH1ROUguWO3t0u6ZwevUDRHuGN19v/BQa/muUiq9uxzrwy/ZW+Ln7:6gqDdPofMR/TWOSKY0Emo
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2664-0-0x0000000000310000-0x0000000000396000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2664 set thread context of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2728 2608 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2664 wrote to memory of 2608 2664 6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe 29 PID 2608 wrote to memory of 2728 2608 RegAsm.exe 30 PID 2608 wrote to memory of 2728 2608 RegAsm.exe 30 PID 2608 wrote to memory of 2728 2608 RegAsm.exe 30 PID 2608 wrote to memory of 2728 2608 RegAsm.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe"C:\Users\Admin\AppData\Local\Temp\6a103e31e7c1990a5f21e6ad483805b01fdbabe9fd9454f42aab0eda9b5d67cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 2603⤵
- Program crash
PID:2728
-
-