Analysis
-
max time kernel
10s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
e837bf6c58ee97ebdb7c3d58a733f3d527bf0150f1eb551af6707f71d54a3457.exe
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
General
-
Target
e837bf6c58ee97ebdb7c3d58a733f3d527bf0150f1eb551af6707f71d54a3457.exe
-
Size
481KB
-
MD5
d555da013d512f714926dd3213083e5d
-
SHA1
25ae9c59ae5b3bfe27933981b0a68a0445b22458
-
SHA256
e837bf6c58ee97ebdb7c3d58a733f3d527bf0150f1eb551af6707f71d54a3457
-
SHA512
7f3ad943dbdec3c803f8664d2095add10deb9477acf8c3784411708401a7ca748969fba617a82cd212a0070ec84c061719b9d2175b7570ea68b7b51f97b590e0
-
SSDEEP
6144:0stUW74e1KpFcqsIi3IDCIHA/lWGHalBNLrK2OgBBmdN3MVqRw6aPMGGmGlH:02UWwFZCTsG4BNSgB43MBm
Malware Config
Signatures
-
Detect ZGRat V1 11 IoCs
resource yara_rule behavioral2/memory/2080-4-0x0000000005FF0000-0x00000000061F0000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-5-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-6-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-8-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-10-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-12-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-14-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-16-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-18-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-20-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 behavioral2/memory/2080-22-0x0000000005FF0000-0x00000000061EB000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2080 e837bf6c58ee97ebdb7c3d58a733f3d527bf0150f1eb551af6707f71d54a3457.exe