Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 01:26
Behavioral task
behavioral1
Sample
ad997dc4ee32ab469e45009f218175d0.exe
Resource
win7-20240221-en
windows7-x64
9 signatures
150 seconds
General
-
Target
ad997dc4ee32ab469e45009f218175d0.exe
-
Size
314KB
-
MD5
ad997dc4ee32ab469e45009f218175d0
-
SHA1
17ef145486c494ea9c727972c501471e720887f0
-
SHA256
a1f8bb5990775f277540eb4c7579695477445afd90262cb819567cc9b3042166
-
SHA512
727aceb3edd5dfbbbad84e1aef4beb3773313378bd4fa6cd77800d6cf578ba740a5ebc1f3740593071a26daa2cf91e49243fa4ba043d934c8bd936a1526c18d0
-
SSDEEP
3072:oiPK9mkbyBaKJyPATmiyAnY5o9BrFV0bIBVvBCj4EKK4h75AQ5ii:oCj2yBOiW5o972jEh75F5ii
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral2/memory/684-1-0x00000000007B0000-0x0000000000804000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/684-1-0x00000000007B0000-0x0000000000804000-memory.dmp net_reactor -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ad997dc4ee32ab469e45009f218175d0.exedescription pid process target process PID 684 wrote to memory of 3036 684 ad997dc4ee32ab469e45009f218175d0.exe schtasks.exe PID 684 wrote to memory of 3036 684 ad997dc4ee32ab469e45009f218175d0.exe schtasks.exe PID 684 wrote to memory of 3036 684 ad997dc4ee32ab469e45009f218175d0.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad997dc4ee32ab469e45009f218175d0.exe"C:\Users\Admin\AppData\Local\Temp\ad997dc4ee32ab469e45009f218175d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Necobit.exe'"2⤵
- Creates scheduled task(s)
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1348 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:3564