Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe
Resource
win7-20240215-en
General
-
Target
4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe
-
Size
968KB
-
MD5
577df0d0d1ebfde0c67cf6489d9a1974
-
SHA1
a57a31db630fd55666cfd3ccdacf78cec8fabc43
-
SHA256
4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e
-
SHA512
5144fbd78a903c866e4e8becefb707656c19caf94c7b82c18d6b50ab86899dd149545b34e2fb8f5f71b02baa9ec95f1aaf97aa65ce94ed6e463b4b51f8cc4fd0
-
SSDEEP
12288:M9tmvboNKAM9qPg6f0blJwoodEJLaCyi5yHhFDsw/DEdLpIeBTRPJ3Ap1H+9:M9mENKAiGolJwooKJVyJF3qLpIYyHM
Malware Config
Signatures
-
Detect ZGRat V2 1 IoCs
resource yara_rule behavioral2/memory/2184-6-0x0000000004F00000-0x0000000004F3A000-memory.dmp family_zgrat_v2 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\j: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\k: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\s: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\y: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\g: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\l: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\m: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\o: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\p: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\q: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\b: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\i: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\t: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\v: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\x: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\z: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\a: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\e: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\n: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\r: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\u: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe File opened (read-only) \??\w: 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe -
AutoIT Executable 22 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4324-8-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-10-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-11-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-13-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-14-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-16-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-20-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-24-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-28-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-32-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-36-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-37-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-40-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-49-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-48-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-52-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-56-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-64-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-65-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-68-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-72-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4324-86-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2184 set thread context of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3076 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 103 PID 2184 wrote to memory of 3076 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 103 PID 2184 wrote to memory of 3076 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 103 PID 2184 wrote to memory of 3652 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 104 PID 2184 wrote to memory of 3652 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 104 PID 2184 wrote to memory of 3652 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 104 PID 2184 wrote to memory of 4244 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 105 PID 2184 wrote to memory of 4244 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 105 PID 2184 wrote to memory of 4244 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 105 PID 2184 wrote to memory of 4364 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 106 PID 2184 wrote to memory of 4364 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 106 PID 2184 wrote to memory of 4364 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 106 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 2184 wrote to memory of 4324 2184 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 107 PID 4324 wrote to memory of 2268 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 108 PID 4324 wrote to memory of 2268 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 108 PID 4324 wrote to memory of 2268 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 108 PID 4324 wrote to memory of 5092 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 110 PID 4324 wrote to memory of 5092 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 110 PID 4324 wrote to memory of 5092 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 110 PID 4324 wrote to memory of 4900 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 112 PID 4324 wrote to memory of 4900 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 112 PID 4324 wrote to memory of 4900 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 112 PID 4324 wrote to memory of 5104 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 114 PID 4324 wrote to memory of 5104 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 114 PID 4324 wrote to memory of 5104 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 114 PID 4324 wrote to memory of 1100 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 116 PID 4324 wrote to memory of 1100 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 116 PID 4324 wrote to memory of 1100 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 116 PID 4324 wrote to memory of 716 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 118 PID 4324 wrote to memory of 716 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 118 PID 4324 wrote to memory of 716 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 118 PID 4324 wrote to memory of 3044 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 120 PID 4324 wrote to memory of 3044 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 120 PID 4324 wrote to memory of 3044 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 120 PID 4324 wrote to memory of 3520 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 122 PID 4324 wrote to memory of 3520 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 122 PID 4324 wrote to memory of 3520 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 122 PID 4324 wrote to memory of 2892 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 124 PID 4324 wrote to memory of 2892 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 124 PID 4324 wrote to memory of 2892 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 124 PID 4324 wrote to memory of 4752 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 126 PID 4324 wrote to memory of 4752 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 126 PID 4324 wrote to memory of 4752 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 126 PID 4324 wrote to memory of 3900 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 128 PID 4324 wrote to memory of 3900 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 128 PID 4324 wrote to memory of 3900 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 128 PID 4324 wrote to memory of 1168 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 130 PID 4324 wrote to memory of 1168 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 130 PID 4324 wrote to memory of 1168 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 130 PID 4324 wrote to memory of 2160 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 132 PID 4324 wrote to memory of 2160 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 132 PID 4324 wrote to memory of 2160 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 132 PID 4324 wrote to memory of 4888 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 134 PID 4324 wrote to memory of 4888 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 134 PID 4324 wrote to memory of 4888 4324 4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe 134
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe"C:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exeC:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe2⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exeC:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe2⤵PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exeC:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe2⤵PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exeC:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe2⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exeC:\Users\Admin\AppData\Local\Temp\4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e.exe2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A3⤵PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A3⤵PID:5092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A3⤵PID:4900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:5104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A3⤵PID:1100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A3⤵PID:716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A3⤵PID:3044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A3⤵PID:3520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A3⤵PID:2892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A3⤵PID:4752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A3⤵PID:3900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A3⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A3⤵PID:2160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A3⤵PID:4888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A3⤵PID:4192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A3⤵PID:400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A3⤵PID:4596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A3⤵PID:3196
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1044 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:3692