Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2024 05:03

General

  • Target

    be5041fb817fe1edf7e6c487db9b5534.exe

  • Size

    16KB

  • MD5

    be5041fb817fe1edf7e6c487db9b5534

  • SHA1

    38040d570af54917957504bd88ab7c555e0ee3ba

  • SHA256

    9663cb27096c5592837253411ddee56a54b84b1851cd77e7b33768091ef26fa2

  • SHA512

    8a0200768436ec3e06b11b2447136720af887398d37bc3e635dd417b5dfd86734f8ebc425ed1e8eb2b2689838f3acda0f9a3f6192a54460b4da1027112d28e62

  • SSDEEP

    384:XZ5sjmrXdBJsVbWcoWj7/D1IDBRJJSrxGw6lx87Pr:p5sjmtsV7PI1PmkEr

Malware Config

Extracted

Family

purecrypter

C2

http://41.216.183.153/no/dontlook/re/research/Kofdzsxxr.mp3

Signatures

  • Detect ZGRat V1 35 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\be5041fb817fe1edf7e6c487db9b5534.exe
        "C:\Users\Admin\AppData\Local\Temp\be5041fb817fe1edf7e6c487db9b5534.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2784
    • C:\Users\Admin\AppData\Local\Temp\be5041fb817fe1edf7e6c487db9b5534.exe
      "C:\Users\Admin\AppData\Local\Temp\be5041fb817fe1edf7e6c487db9b5534.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2188
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2232
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAATgB1AG0AYgBlAHIARABlAGMAaQBtAGEAbABEAGkAZwBpAHQAcwAuAGUAeABlADsA
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:644

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\be5041fb817fe1edf7e6c487db9b5534.exe.log

        Filesize

        1KB

        MD5

        b78f0793c3ef1d417e56d34b656b40bb

        SHA1

        4a622f8022516098cb5aae35a5953bde039111a7

        SHA256

        67090a383e35cf075d5c0f0c1d78c4e4b805de6aa951b5d4dd01fd9ae8ccdcfb

        SHA512

        ab3fb91602bd6f070d9b060da4a26d01869e9b23e319db9164d2e251b2c47db690da0f832e69a45c03bc99919942ef516a0b157cfa0aaea84e64b1e90ae5b933

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_v5dd4by2.gle.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/644-7091-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmp

        Filesize

        10.8MB

      • memory/644-7087-0x000001D0D85C0000-0x000001D0D85D0000-memory.dmp

        Filesize

        64KB

      • memory/644-7086-0x000001D0D85C0000-0x000001D0D85D0000-memory.dmp

        Filesize

        64KB

      • memory/644-7085-0x000001D0D86D0000-0x000001D0D86F2000-memory.dmp

        Filesize

        136KB

      • memory/644-7075-0x000001D0D85C0000-0x000001D0D85D0000-memory.dmp

        Filesize

        64KB

      • memory/644-7074-0x000001D0D85C0000-0x000001D0D85D0000-memory.dmp

        Filesize

        64KB

      • memory/644-7073-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmp

        Filesize

        10.8MB

      • memory/2188-55-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-63-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-17-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-19-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-21-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-23-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-25-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-27-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-29-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-31-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-33-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-35-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-37-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-39-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-41-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-43-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-45-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-47-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-49-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-51-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-53-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-0-0x000001D23F190000-0x000001D23F198000-memory.dmp

        Filesize

        32KB

      • memory/2188-57-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-59-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-61-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-15-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-65-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-67-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-1133-0x00007FFA05B20000-0x00007FFA065E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2188-1475-0x000001D240D60000-0x000001D240D70000-memory.dmp

        Filesize

        64KB

      • memory/2188-4830-0x000001D240D20000-0x000001D240D21000-memory.dmp

        Filesize

        4KB

      • memory/2188-4831-0x000001D259B10000-0x000001D259BFC000-memory.dmp

        Filesize

        944KB

      • memory/2188-4832-0x000001D240D70000-0x000001D240DBC000-memory.dmp

        Filesize

        304KB

      • memory/2188-4833-0x000001D259C00000-0x000001D259C54000-memory.dmp

        Filesize

        336KB

      • memory/2188-13-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-1-0x00007FFA05B20000-0x00007FFA065E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2188-2-0x000001D240D60000-0x000001D240D70000-memory.dmp

        Filesize

        64KB

      • memory/2188-4841-0x00007FFA05B20000-0x00007FFA065E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2188-3-0x000001D259760000-0x000001D259A0A000-memory.dmp

        Filesize

        2.7MB

      • memory/2188-4-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-5-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-7-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-9-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2188-11-0x000001D259760000-0x000001D259A04000-memory.dmp

        Filesize

        2.6MB

      • memory/2784-7072-0x00007FFA05B20000-0x00007FFA065E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2784-7070-0x00007FFA05B20000-0x00007FFA065E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2784-7069-0x000001B4E05B0000-0x000001B4E0606000-memory.dmp

        Filesize

        344KB

      • memory/2784-4844-0x000001B4E04C0000-0x000001B4E05A6000-memory.dmp

        Filesize

        920KB

      • memory/2784-4843-0x000001B4C7CA0000-0x000001B4C7CB0000-memory.dmp

        Filesize

        64KB

      • memory/2784-4842-0x00007FFA05B20000-0x00007FFA065E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2784-4840-0x0000000140000000-0x000000014009A000-memory.dmp

        Filesize

        616KB