Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-es -
resource tags
arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows -
submitted
27-03-2024 15:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
12.exe
Resource
win7-20240221-es
windows7-x64
5 signatures
120 seconds
Behavioral task
behavioral2
Sample
12.exe
Resource
win10v2004-20240226-es
windows10-2004-x64
6 signatures
120 seconds
General
-
Target
12.exe
-
Size
275KB
-
MD5
d08b871274cd8c8e5033e354c55e44bc
-
SHA1
1ee737ecbe44bf49467b1743a6021df4a581e122
-
SHA256
e2a5c5c2e695cd3e44db874a2ceee23ec1915574c126f6b2f9c387802bd70e22
-
SHA512
fdfcdc5f6004d99dee8cff5b184554a347916b1ec9f510e4bcfa05d81c6aeb9bdedcea45104e8ba3c3a38c247d386d45ce84d4e75e102c541488466f5d5ed243
-
SSDEEP
3072:qs2fzJpw9ouUB4KkCkx5kKn7GLGGKgr/JhnZZoDiuTvORNpe:FG6dKk5HgDJhnZZoDiwvO1
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral1/memory/2548-3-0x0000000005C00000-0x0000000005E5C000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-4-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-5-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-7-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-9-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-11-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-13-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-15-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-17-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-19-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-21-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-23-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-25-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-27-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-29-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-31-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-33-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-35-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-37-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-39-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-41-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-43-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-45-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-47-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-49-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-51-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-53-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-55-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-57-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-59-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-61-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-63-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-65-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 behavioral1/memory/2548-67-0x0000000005C00000-0x0000000005E57000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
12.exedescription pid process target process PID 2548 set thread context of 1976 2548 12.exe 12.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
12.exedescription pid process Token: SeDebugPrivilege 2548 12.exe Token: SeDebugPrivilege 2548 12.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
12.exedescription pid process target process PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe PID 2548 wrote to memory of 1976 2548 12.exe 12.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"2⤵PID:1976