Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 08:58
Behavioral task
behavioral1
Sample
4eda5246e489dfa5edadc1a46221b9b6.exe
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
4eda5246e489dfa5edadc1a46221b9b6.exe
-
Size
5.3MB
-
MD5
4eda5246e489dfa5edadc1a46221b9b6
-
SHA1
5d11b441365ea64090f34c68b4cf47b9d2d701dc
-
SHA256
f141b5eee77d2391f8ff169914873e1219c2b47ebfde2b5bdfc0af7c6e08217b
-
SHA512
783b801030b15b53633509ed36c815d928a67e9c833d2c8a2cc368fda8a5b76386c34ca767636d0fd3d0262ee059af89784324701eac46f4867f8ea9e74f4625
-
SSDEEP
49152:Kh8VUIicvXIXj97Nf50oyGRUxhtIHsWZsn+We5l7BGthQ3QTNxGSr+GiM+t2aVo/:Kh8VUIi4XIp7Nh0asO5JoHt7XXA2psO
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2884-1-0x0000000001130000-0x0000000001684000-memory.dmp family_zgrat_v1 -
Program crash 1 IoCs
pid pid_target Process procid_target 2712 2884 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2712 2884 4eda5246e489dfa5edadc1a46221b9b6.exe 28 PID 2884 wrote to memory of 2712 2884 4eda5246e489dfa5edadc1a46221b9b6.exe 28 PID 2884 wrote to memory of 2712 2884 4eda5246e489dfa5edadc1a46221b9b6.exe 28 PID 2884 wrote to memory of 2712 2884 4eda5246e489dfa5edadc1a46221b9b6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eda5246e489dfa5edadc1a46221b9b6.exe"C:\Users\Admin\AppData\Local\Temp\4eda5246e489dfa5edadc1a46221b9b6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 5642⤵
- Program crash
PID:2712
-