Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-03-2024 15:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d13bb43ed0d785b7026cbfd743123568.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
d13bb43ed0d785b7026cbfd743123568.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
d13bb43ed0d785b7026cbfd743123568.exe
-
Size
826KB
-
MD5
d13bb43ed0d785b7026cbfd743123568
-
SHA1
77921fd7d2a82f9d42a44fee2df3dfd7e1c459f6
-
SHA256
4accc75edd57e5a6e939f1c122ad24949c1305ce70d9796fd57b8d3028f4a8da
-
SHA512
1b1015aed280490ef537297bc093ede2dc32c3f1a66edd713835c047bde10c810d3e75b59f196104d9ac88cb6a1a6b971caa17e91189bb8fe56f46bc10003837
-
SSDEEP
12288:Zu5JfleohV9oasH4EIKGZeBAuUyf1aAjBHwYDxt1YHsH:Zu5Jt5o3H4EIKyDmf1a6wYDjKs
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2240-5-0x0000000002190000-0x0000000002206000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-6-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-7-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-9-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-11-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-15-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-13-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-17-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-19-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-21-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-23-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-25-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-27-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-29-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-31-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-33-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-35-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-37-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-39-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-41-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-43-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-45-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-47-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-49-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-51-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-53-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-55-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-57-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-59-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-61-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-63-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-65-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-67-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-69-0x0000000002190000-0x0000000002200000-memory.dmp family_zgrat_v1 -
Deletes itself 1 IoCs
pid Process 2672 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2240 d13bb43ed0d785b7026cbfd743123568.exe 2672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2240 d13bb43ed0d785b7026cbfd743123568.exe Token: SeDebugPrivilege 2672 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2672 2240 d13bb43ed0d785b7026cbfd743123568.exe 31 PID 2240 wrote to memory of 2672 2240 d13bb43ed0d785b7026cbfd743123568.exe 31 PID 2240 wrote to memory of 2672 2240 d13bb43ed0d785b7026cbfd743123568.exe 31 PID 2240 wrote to memory of 2672 2240 d13bb43ed0d785b7026cbfd743123568.exe 31 PID 2240 wrote to memory of 2544 2240 d13bb43ed0d785b7026cbfd743123568.exe 33 PID 2240 wrote to memory of 2544 2240 d13bb43ed0d785b7026cbfd743123568.exe 33 PID 2240 wrote to memory of 2544 2240 d13bb43ed0d785b7026cbfd743123568.exe 33 PID 2240 wrote to memory of 2544 2240 d13bb43ed0d785b7026cbfd743123568.exe 33 PID 2240 wrote to memory of 2688 2240 d13bb43ed0d785b7026cbfd743123568.exe 34 PID 2240 wrote to memory of 2688 2240 d13bb43ed0d785b7026cbfd743123568.exe 34 PID 2240 wrote to memory of 2688 2240 d13bb43ed0d785b7026cbfd743123568.exe 34 PID 2240 wrote to memory of 2688 2240 d13bb43ed0d785b7026cbfd743123568.exe 34 PID 2240 wrote to memory of 2776 2240 d13bb43ed0d785b7026cbfd743123568.exe 35 PID 2240 wrote to memory of 2776 2240 d13bb43ed0d785b7026cbfd743123568.exe 35 PID 2240 wrote to memory of 2776 2240 d13bb43ed0d785b7026cbfd743123568.exe 35 PID 2240 wrote to memory of 2776 2240 d13bb43ed0d785b7026cbfd743123568.exe 35 PID 2240 wrote to memory of 2528 2240 d13bb43ed0d785b7026cbfd743123568.exe 36 PID 2240 wrote to memory of 2528 2240 d13bb43ed0d785b7026cbfd743123568.exe 36 PID 2240 wrote to memory of 2528 2240 d13bb43ed0d785b7026cbfd743123568.exe 36 PID 2240 wrote to memory of 2528 2240 d13bb43ed0d785b7026cbfd743123568.exe 36 PID 2240 wrote to memory of 2932 2240 d13bb43ed0d785b7026cbfd743123568.exe 37 PID 2240 wrote to memory of 2932 2240 d13bb43ed0d785b7026cbfd743123568.exe 37 PID 2240 wrote to memory of 2932 2240 d13bb43ed0d785b7026cbfd743123568.exe 37 PID 2240 wrote to memory of 2932 2240 d13bb43ed0d785b7026cbfd743123568.exe 37 PID 2240 wrote to memory of 2448 2240 d13bb43ed0d785b7026cbfd743123568.exe 38 PID 2240 wrote to memory of 2448 2240 d13bb43ed0d785b7026cbfd743123568.exe 38 PID 2240 wrote to memory of 2448 2240 d13bb43ed0d785b7026cbfd743123568.exe 38 PID 2240 wrote to memory of 2448 2240 d13bb43ed0d785b7026cbfd743123568.exe 38 PID 2240 wrote to memory of 2564 2240 d13bb43ed0d785b7026cbfd743123568.exe 39 PID 2240 wrote to memory of 2564 2240 d13bb43ed0d785b7026cbfd743123568.exe 39 PID 2240 wrote to memory of 2564 2240 d13bb43ed0d785b7026cbfd743123568.exe 39 PID 2240 wrote to memory of 2564 2240 d13bb43ed0d785b7026cbfd743123568.exe 39 PID 2240 wrote to memory of 2596 2240 d13bb43ed0d785b7026cbfd743123568.exe 40 PID 2240 wrote to memory of 2596 2240 d13bb43ed0d785b7026cbfd743123568.exe 40 PID 2240 wrote to memory of 2596 2240 d13bb43ed0d785b7026cbfd743123568.exe 40 PID 2240 wrote to memory of 2596 2240 d13bb43ed0d785b7026cbfd743123568.exe 40 PID 2240 wrote to memory of 2472 2240 d13bb43ed0d785b7026cbfd743123568.exe 41 PID 2240 wrote to memory of 2472 2240 d13bb43ed0d785b7026cbfd743123568.exe 41 PID 2240 wrote to memory of 2472 2240 d13bb43ed0d785b7026cbfd743123568.exe 41 PID 2240 wrote to memory of 2472 2240 d13bb43ed0d785b7026cbfd743123568.exe 41 PID 2240 wrote to memory of 2424 2240 d13bb43ed0d785b7026cbfd743123568.exe 42 PID 2240 wrote to memory of 2424 2240 d13bb43ed0d785b7026cbfd743123568.exe 42 PID 2240 wrote to memory of 2424 2240 d13bb43ed0d785b7026cbfd743123568.exe 42 PID 2240 wrote to memory of 2424 2240 d13bb43ed0d785b7026cbfd743123568.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe"C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe" -Force2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exeC:\Users\Admin\AppData\Local\Temp\d13bb43ed0d785b7026cbfd743123568.exe2⤵PID:2424
-