Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
cp.exe
Resource
win7-20240319-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
cp.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
cp.exe
-
Size
115KB
-
MD5
adc187b1e5a6b66ca28fd3be5f6790cc
-
SHA1
ce467cb5d6275cd8289847c77ed9ebaee1c04a89
-
SHA256
c4e838a74e5baf5dbd86beedff96c1c9353b49ecf2ad362f47a4b134453701ab
-
SHA512
9f5d187c585a7344375ef5f239d4d10461c3fd5bf6b411e7e85edd8ead1f2994f41e4c62587425de480d05b7ddac7bd4cdd0754e382fcdfeac2f59c8c14105d9
-
SSDEEP
3072:93gZUdrIQe1ZuWX6gKINkdPbxLaOnwocubCIj57CI7:H+QyubhdEon57v
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral2/memory/2444-4-0x00000000072F0000-0x0000000007510000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-7-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-8-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-10-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-12-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-14-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-16-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-18-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-20-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-22-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-24-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-26-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-28-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-30-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-32-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-34-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-36-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-38-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-40-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-42-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-44-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-46-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-48-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-50-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-52-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-54-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-56-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-58-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-60-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-62-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-64-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-66-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-68-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 behavioral2/memory/2444-70-0x00000000072F0000-0x0000000007509000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuupdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vuupdate.exe" cp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cp.exedescription pid process target process PID 2444 set thread context of 760 2444 cp.exe InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
cp.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 2444 cp.exe Token: SeDebugPrivilege 2444 cp.exe Token: SeDebugPrivilege 760 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cp.exedescription pid process target process PID 2444 wrote to memory of 760 2444 cp.exe InstallUtil.exe PID 2444 wrote to memory of 760 2444 cp.exe InstallUtil.exe PID 2444 wrote to memory of 760 2444 cp.exe InstallUtil.exe PID 2444 wrote to memory of 760 2444 cp.exe InstallUtil.exe PID 2444 wrote to memory of 760 2444 cp.exe InstallUtil.exe PID 2444 wrote to memory of 760 2444 cp.exe InstallUtil.exe PID 2444 wrote to memory of 760 2444 cp.exe InstallUtil.exe PID 2444 wrote to memory of 760 2444 cp.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cp.exe"C:\Users\Admin\AppData\Local\Temp\cp.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:760