Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe
Resource
win10v2004-20240226-en
General
-
Target
f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe
-
Size
420KB
-
MD5
4637890c14f37ece8321cf079192acd2
-
SHA1
8ab20768d020d40988fb848eeabb8efb16459330
-
SHA256
f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246
-
SHA512
977fac279c2e4852689cc4f65f4ef15cba035ac6b88d5b87e297ab2a8b73c12a6f29b3c58e5bacaedd86c1a4a8d2fcc175054a7eb273bdc9f11819c6631470cd
-
SSDEEP
6144:IbUCjzAieqUWBh4HtbcOdSTzUhDUKtNNhmQiBgZCxahmGatV48Mzr0YRDmX7:niDlh4HVcOiUxr3hmhC7h9warjR4
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2784-3-0x00000000006E0000-0x00000000007B6000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-5-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-7-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-11-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-9-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-13-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-15-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-19-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-17-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-23-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-25-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-29-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-33-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-31-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-37-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-39-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-43-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-45-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-49-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-51-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-53-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-57-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-61-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-59-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-63-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-67-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-65-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-55-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-47-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-41-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-35-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-27-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-21-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 behavioral1/memory/2784-4-0x00000000006E0000-0x00000000007B0000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe" powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2784 f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe Token: SeDebugPrivilege 2980 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2980 2784 f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe 29 PID 2784 wrote to memory of 2980 2784 f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe 29 PID 2784 wrote to memory of 2980 2784 f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe 29 PID 2784 wrote to memory of 2980 2784 f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe"C:\Users\Admin\AppData\Local\Temp\f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246' -Value '"C:\Users\Admin\AppData\Local\Temp\f762e754543decaa05f5a48eb894db18c2396feac1f983dc732b17e5563cf246.exe"' -PropertyType 'String'2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-