Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 18:23
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
5.9MB
-
MD5
d21ebfa5e971bb5293c9de7a404792a1
-
SHA1
850cae6b28d100738547f8a86889d71ff5289073
-
SHA256
cb49adf3033abe1d446541a2b216b7cc9f50cd74494ec7d78dd365c952d3487b
-
SHA512
2fe8f296117e70a05fa24f0be9250fff84af339eed1bfe46d1c218a0210324b9e0f77ddaf6ad518eca8370fc3023238f7fa13f483f30c545c10fc2e02f973a6f
-
SSDEEP
49152:VdFCDWU2GG8XKQ3/cdt4osAZo5+cSAsAUSNlLOg/L1Jf2jTiQ/VoJu4E9/+j9Z29:VnCDL2uKecbO4ihsAUoDjj233NmmcPK7
Malware Config
Extracted
Family
gozi
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1700-1-0x0000000000EA0000-0x0000000001482000-memory.dmp family_zgrat_v1 -
Program crash 1 IoCs
pid pid_target Process procid_target 2600 1700 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2600 1700 file.exe 28 PID 1700 wrote to memory of 2600 1700 file.exe 28 PID 1700 wrote to memory of 2600 1700 file.exe 28 PID 1700 wrote to memory of 2600 1700 file.exe 28