Analysis

  • max time kernel
    131s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 02:38

General

  • Target

    bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d.exe

  • Size

    439KB

  • MD5

    f76cb49209891942d2ca806020803edc

  • SHA1

    1b1ff4a0d1113f28af22594ded0d903d1c18083f

  • SHA256

    bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d

  • SHA512

    36789735351332bc077aa5c0aeed728d2aca7cb4ad21d3c102e4ad5507a8a97775084b7d199c39d1deb36233d8cec7242aac464c4c619a92d76516ed1939b91c

  • SSDEEP

    12288:CeOQHNSzWA5z9nmoKbNlYmF/wclabxQpgEHgFbqgBr:8QH0WA5z9nhg7YmF4claaJu

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d.exe
    "C:\Users\Admin\AppData\Local\Temp\bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d' -Value '"C:\Users\Admin\AppData\Roaming\bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d.exe"' -PropertyType 'String'
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1752-6285-0x000007FEF22A0000-0x000007FEF2C3D000-memory.dmp

    Filesize

    9.6MB

  • memory/1752-6286-0x0000000002870000-0x00000000028F0000-memory.dmp

    Filesize

    512KB

  • memory/1752-6287-0x000007FEF22A0000-0x000007FEF2C3D000-memory.dmp

    Filesize

    9.6MB

  • memory/1752-6288-0x000000001B410000-0x000000001B6F2000-memory.dmp

    Filesize

    2.9MB

  • memory/1752-6289-0x0000000002870000-0x00000000028F0000-memory.dmp

    Filesize

    512KB

  • memory/1752-6293-0x000007FEF22A0000-0x000007FEF2C3D000-memory.dmp

    Filesize

    9.6MB

  • memory/1752-6292-0x0000000002870000-0x00000000028F0000-memory.dmp

    Filesize

    512KB

  • memory/1752-6290-0x0000000002270000-0x0000000002278000-memory.dmp

    Filesize

    32KB

  • memory/1900-33-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-43-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-5-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-7-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-9-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-11-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-13-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-15-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-17-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-19-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-21-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-23-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-25-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-27-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-29-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-31-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-3-0x000000001A770000-0x000000001A84C000-memory.dmp

    Filesize

    880KB

  • memory/1900-35-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-37-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-39-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-41-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-4-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-45-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-47-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-49-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-51-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-53-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-55-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-57-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-59-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-61-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-63-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-2-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1900-65-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-67-0x000000001A770000-0x000000001A847000-memory.dmp

    Filesize

    860KB

  • memory/1900-6278-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

    Filesize

    9.9MB

  • memory/1900-6279-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1900-6280-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1900-6291-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1900-1-0x000007FEF5B30000-0x000007FEF651C000-memory.dmp

    Filesize

    9.9MB

  • memory/1900-0-0x0000000000360000-0x00000000003D4000-memory.dmp

    Filesize

    464KB

  • memory/1900-6294-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB

  • memory/1900-6295-0x000000001AFD0000-0x000000001B050000-memory.dmp

    Filesize

    512KB