Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe
Resource
win10v2004-20240319-en
General
-
Target
89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe
-
Size
451KB
-
MD5
0d34f2b095cbff0be00eb45758929907
-
SHA1
3fa3b5e296d49c4d8e6dfc5d4b775a48609aca78
-
SHA256
89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20
-
SHA512
6965e9d2c2b9a11bb428ba8ac47202b7d0d4aaf826f905fb0afee903b2ae4b85cec446b536721b84237aeeb08f03ff413a67c75c36ba78d85a6727831e7b6340
-
SSDEEP
6144:xpHC550+1KYQ2JRpK3SRgadBU9RwfqUKDPi5xo/nY:xpis+S2JRpK3SRgKQ/n
Malware Config
Extracted
bitrat
1.38
103.153.182.247:6161
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/4956-3-0x0000000005C60000-0x0000000006044000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-4-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-5-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-7-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-9-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-11-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-13-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-15-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-17-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-19-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-21-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-23-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-25-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-27-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-29-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-31-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-33-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-35-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-37-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-39-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-41-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-43-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-45-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-47-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-49-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-51-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-53-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-55-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-57-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-59-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-61-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-63-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-65-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 behavioral2/memory/4956-67-0x0000000005C60000-0x000000000603F000-memory.dmp family_zgrat_v1 -
Detects executables Discord URL observed in first stage droppers 1 IoCs
resource yara_rule behavioral2/memory/4956-0-0x0000000000780000-0x00000000007F6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bcesihxe.vbs 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Install name = "C:\\Users\\Admin\\AppData\\Local\\Install path\\Install name" 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4956 set thread context of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 -
Suspicious behavior: RenamesItself 4 IoCs
pid Process 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe Token: SeDebugPrivilege 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe Token: SeShutdownPrivilege 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 744 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108 PID 4956 wrote to memory of 744 4956 89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe"C:\Users\Admin\AppData\Local\Temp\89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe"C:\Users\Admin\AppData\Local\Temp\89d511c97a4e0f4bf48a72fe764adb6d3de9007859c7632dc07477f2062c2b20.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3920 --field-trial-handle=2228,i,17475224967547320003,13667387715861799238,262144 --variations-seed-version /prefetch:81⤵PID:2788