Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/03/2024, 18:47
Behavioral task
behavioral1
Sample
36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe
Resource
win11-20240221-en
General
-
Target
36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe
-
Size
7.1MB
-
MD5
45d20d471e6f3f8f088d489d62058f23
-
SHA1
d261d037781fb5e7124a40df3d2e32e4d694c2c4
-
SHA256
36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711
-
SHA512
3e04852233147146e76684ebcc335e6281413796cf148d34234b86753a3f2b2afb2e58853d44873dc43f9578639ef55f35aab98aaee7dda718f6cfaeb4e4a02e
-
SSDEEP
49152:OcaZULgYNoMBuTzmK2tR6ddPIDPSh0VOze+7gzp/Y4RtLHfoKOIuiXzQEcnFIfWO:TaZU5NM7g5fofI3N8FV3Q
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4892-1-0x0000000000360000-0x0000000000A70000-memory.dmp family_zgrat_v1 -
Loads dropped DLL 1 IoCs
pid Process 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-627134735-902745853-4257352768-1000\Software\Microsoft\Windows\CurrentVersion\Run\kwweifjdskdv = "C:\\Users\\Admin\\AppData\\Local\\kwweifjdskdv\\kwweifjdskdv.exe" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4892 set thread context of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4724 powershell.exe 4724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2876 RegSvcs.exe Token: SeDebugPrivilege 4724 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 PID 4892 wrote to memory of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 PID 4892 wrote to memory of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 PID 4892 wrote to memory of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 PID 4892 wrote to memory of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 PID 4892 wrote to memory of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 PID 4892 wrote to memory of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 PID 4892 wrote to memory of 2876 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 80 PID 4892 wrote to memory of 4724 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 81 PID 4892 wrote to memory of 4724 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 81 PID 4892 wrote to memory of 4724 4892 36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe"C:\Users\Admin\AppData\Local\Temp\36fb77c427020d85e61482f25c7e8127221e1d48c358be97728068e6a487b711.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'kwweifjdskdv';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'kwweifjdskdv' -Value '"C:\Users\Admin\AppData\Local\kwweifjdskdv\kwweifjdskdv.exe"' -PropertyType 'String'2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82