Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
8ab428444842653c6ebf5a71f14f80e2.exe
Resource
win7-20240221-en
General
-
Target
8ab428444842653c6ebf5a71f14f80e2.exe
-
Size
697KB
-
MD5
8ab428444842653c6ebf5a71f14f80e2
-
SHA1
780f71e211c5dbe9e37805fdcbaf88359651f7b2
-
SHA256
003c78df2e77687e1b28a9b498152cff4ce27ab0bef5f65b3a2c00b37ef49c13
-
SHA512
37bf000a2407a9eac7d8006fec624de07e036c6ec711e95ef15b749cb532a762af2c822089e9f25a3b450a1a9b335ce4193c9a57fc6219054569bf1997e9f79d
-
SSDEEP
12288:jJFKeIV/ORw6mBTCz2BqbKKsobl9XGzwHJeL7dIh89zwHJeo:HC+hbK5ox9XcwpeLkmwpeo
Malware Config
Signatures
-
Detect ZGRat V1 27 IoCs
resource yara_rule behavioral1/memory/3036-16-0x0000000000F60000-0x0000000001034000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-19-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-21-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-23-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-25-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-31-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-33-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-35-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-37-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-39-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-41-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-43-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-45-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-47-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-49-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-51-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-53-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-55-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-57-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-59-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-61-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-63-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-65-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-67-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-69-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-71-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 behavioral1/memory/3036-73-0x0000000000F60000-0x000000000102F000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3036 8ab428444842653c6ebf5a71f14f80e2.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 3036 2936 8ab428444842653c6ebf5a71f14f80e2.exe 28 PID 2936 wrote to memory of 2988 2936 8ab428444842653c6ebf5a71f14f80e2.exe 29 PID 2936 wrote to memory of 2988 2936 8ab428444842653c6ebf5a71f14f80e2.exe 29 PID 2936 wrote to memory of 2988 2936 8ab428444842653c6ebf5a71f14f80e2.exe 29 PID 2936 wrote to memory of 2988 2936 8ab428444842653c6ebf5a71f14f80e2.exe 29 PID 2936 wrote to memory of 2556 2936 8ab428444842653c6ebf5a71f14f80e2.exe 30 PID 2936 wrote to memory of 2556 2936 8ab428444842653c6ebf5a71f14f80e2.exe 30 PID 2936 wrote to memory of 2556 2936 8ab428444842653c6ebf5a71f14f80e2.exe 30 PID 2936 wrote to memory of 2556 2936 8ab428444842653c6ebf5a71f14f80e2.exe 30 PID 2936 wrote to memory of 2588 2936 8ab428444842653c6ebf5a71f14f80e2.exe 31 PID 2936 wrote to memory of 2588 2936 8ab428444842653c6ebf5a71f14f80e2.exe 31 PID 2936 wrote to memory of 2588 2936 8ab428444842653c6ebf5a71f14f80e2.exe 31 PID 2936 wrote to memory of 2588 2936 8ab428444842653c6ebf5a71f14f80e2.exe 31 PID 2556 wrote to memory of 2580 2556 cmd.exe 35 PID 2556 wrote to memory of 2580 2556 cmd.exe 35 PID 2556 wrote to memory of 2580 2556 cmd.exe 35 PID 2556 wrote to memory of 2580 2556 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ab428444842653c6ebf5a71f14f80e2.exe"C:\Users\Admin\AppData\Local\Temp\8ab428444842653c6ebf5a71f14f80e2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\8ab428444842653c6ebf5a71f14f80e2.exe"C:\Users\Admin\AppData\Local\Temp\8ab428444842653c6ebf5a71f14f80e2.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\dghdhww"2⤵PID:2988
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dghdhww\dghdhww.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dghdhww\dghdhww.exe'" /f3⤵
- Creates scheduled task(s)
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\8ab428444842653c6ebf5a71f14f80e2.exe" "C:\Users\Admin\AppData\Roaming\dghdhww\dghdhww.exe"2⤵PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a