Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-04-2024 23:21

General

  • Target

    tmp.exe

  • Size

    5.3MB

  • MD5

    de08b70c1b36bce2c90a34b9e5e61f09

  • SHA1

    1628635f073c61ad744d406a16d46dfac871c9c2

  • SHA256

    432747c04ab478a654328867d7ca806b52fedf1572c74712fa8b7c0edb71df67

  • SHA512

    18a30e480ce7d122cfad5a99570042e3bef9e1f9feda1f7be32b273a7248274285c65ac997c90d3d6a950a37b4ea62e6b928bfefc924187c90e32ea571bfd1f5

  • SSDEEP

    98304:/+p+LLypykV4RJGIfsv7RynHr/x1leOzcv0nbzKIKFStIJ:/+pMLCYJ/svlUr/x1vzcvib+Ir

Malware Config

Signatures

  • Detect ZGRat V1 36 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2484
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4756
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe
        "C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe
          "C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4288
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 444
          3⤵
          • Program crash
          PID:2552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 448
          3⤵
          • Program crash
          PID:872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4508 -ip 4508
      1⤵
        PID:1800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4508 -ip 4508
        1⤵
          PID:1076
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVABhAGcAcwAuAGUAeABlADsA
          1⤵
            PID:4744
          • C:\Users\Admin\AppData\Local\Remaining\iiyvaqxl\Tags.exe
            C:\Users\Admin\AppData\Local\Remaining\iiyvaqxl\Tags.exe
            1⤵
              PID:4456

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            2
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BLHisbnd.exe.log
              Filesize

              716B

              MD5

              4f9cc40b2bfe17ac6d8f4e67dad23157

              SHA1

              f3a7e90a2af422f14a8913e2cf03cb5b639fdb18

              SHA256

              3be33b92192f6b439c3b03172670dfd25018b775a0de1bde5f1e81e22a49ab20

              SHA512

              d3d7c1b1fc70cbd7cc4ebe8649bee97a33476e4a0bd67928b124685d793b463208b78982ce592d352ae5a351eaef4d96fde3b02e69860a1c63ab0e53a8a5fa94

            • C:\Users\Admin\AppData\Local\Remaining\iiyvaqxl\Tags.exe
              Filesize

              1KB

              MD5

              aada92e097a3eef16bf8f44e1e9d47e4

              SHA1

              ab9de3b3e094bb40754022084a3215ca61c1c378

              SHA256

              1d6b6b3140cb37ae849b2071da9b1356d4749141bf7308d46a00892484d12565

              SHA512

              41018ca8565e3552a14f4eb6b0fccef2384d567f7585fbab9dc0919314e59b64c93fd52230613ece02a1a850d4e38ab2e6f08126d1fe58518369b6436d68ae3e

            • C:\Users\Admin\AppData\Local\Remaining\iiyvaqxl\Tags.exe
              Filesize

              19KB

              MD5

              ffef91b976a352a6a63dd38ad1ade91d

              SHA1

              fc699dd128ff5a00cba6a1c947f49321c1bdc913

              SHA256

              0e1de47535298bc754662168aad3e464a709573862c0b402830c018766e45a55

              SHA512

              e3b06be62df35bb1908864d9cb8fa9bd97447f9294e09a9f51bd85e90a1e0cc4552bcf769c633dbeb8116d50edf5ea3fc4e8f68817c36086818a4201556a7628

            • C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe
              Filesize

              3.4MB

              MD5

              e13e6f7986b9d1eff55fe30133592c40

              SHA1

              8299d50b76990e9dc7e0a8cc67e2f4d44cb810f5

              SHA256

              407e9094206a37707a368f4cd0103269c50b8c0c03edba87b4f20664d259f207

              SHA512

              bb41209d410ff38c01279d119f646658e363a3055a4f152b6a2c76b9cdb1fb42441b243fa8f7fb7a353a1b0e78c619e499274185f40d8592e43551da46bd97a6

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ubax3fen.odi.ps1
              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • memory/1576-9811-0x0000000005640000-0x0000000005734000-memory.dmp
              Filesize

              976KB

            • memory/1576-9816-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/1576-9809-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
              Filesize

              64KB

            • memory/1576-9810-0x0000000004EC0000-0x0000000004EC1000-memory.dmp
              Filesize

              4KB

            • memory/1576-6229-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/1576-4904-0x0000000004EE0000-0x0000000005198000-memory.dmp
              Filesize

              2.7MB

            • memory/1576-4900-0x0000000000270000-0x00000000005D0000-memory.dmp
              Filesize

              3.4MB

            • memory/1576-4901-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/2760-34-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-16-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-26-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-28-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-30-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-32-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-1-0x0000000000B40000-0x000000000109A000-memory.dmp
              Filesize

              5.4MB

            • memory/2760-36-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-38-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-40-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-42-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-46-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-44-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-48-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-50-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-52-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-54-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-56-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-58-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-60-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-62-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-64-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-66-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-2075-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/2760-4884-0x0000000005B60000-0x0000000005B70000-memory.dmp
              Filesize

              64KB

            • memory/2760-4885-0x0000000001160000-0x0000000001161000-memory.dmp
              Filesize

              4KB

            • memory/2760-4886-0x00000000073D0000-0x00000000076BC000-memory.dmp
              Filesize

              2.9MB

            • memory/2760-4887-0x00000000019A0000-0x00000000019EC000-memory.dmp
              Filesize

              304KB

            • memory/2760-22-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-4899-0x00000000097B0000-0x0000000009D54000-memory.dmp
              Filesize

              5.6MB

            • memory/2760-4902-0x0000000008A10000-0x0000000008A64000-memory.dmp
              Filesize

              336KB

            • memory/2760-20-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-18-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-24-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-4909-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/2760-0-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/2760-2-0x0000000005B70000-0x0000000006020000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-3-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-4-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-8-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-6-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-10-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-12-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/2760-14-0x0000000005B70000-0x000000000601B000-memory.dmp
              Filesize

              4.7MB

            • memory/4288-9815-0x0000000000930000-0x00000000009DC000-memory.dmp
              Filesize

              688KB

            • memory/4288-9818-0x0000000004E20000-0x0000000004F08000-memory.dmp
              Filesize

              928KB

            • memory/4288-9817-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/4288-12033-0x0000000004FD0000-0x0000000004FD8000-memory.dmp
              Filesize

              32KB

            • memory/4288-12034-0x0000000004FE0000-0x0000000005036000-memory.dmp
              Filesize

              344KB

            • memory/4288-12035-0x0000000005270000-0x00000000052D6000-memory.dmp
              Filesize

              408KB

            • memory/4288-12037-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/4456-12056-0x00000000751D0000-0x0000000075980000-memory.dmp
              Filesize

              7.7MB

            • memory/4508-5084-0x0000000004110000-0x0000000004510000-memory.dmp
              Filesize

              4.0MB

            • memory/4508-4912-0x0000000000400000-0x000000000046D000-memory.dmp
              Filesize

              436KB

            • memory/4508-5033-0x0000000004110000-0x0000000004510000-memory.dmp
              Filesize

              4.0MB

            • memory/4508-5039-0x0000000004110000-0x0000000004510000-memory.dmp
              Filesize

              4.0MB

            • memory/4744-12047-0x000002BAC53C0000-0x000002BAC53E2000-memory.dmp
              Filesize

              136KB

            • memory/4744-12049-0x000002BAAACA0000-0x000002BAAACB0000-memory.dmp
              Filesize

              64KB

            • memory/4744-12048-0x00007FFC363C0000-0x00007FFC36E81000-memory.dmp
              Filesize

              10.8MB

            • memory/4744-12050-0x000002BAAACA0000-0x000002BAAACB0000-memory.dmp
              Filesize

              64KB

            • memory/4744-12053-0x00007FFC363C0000-0x00007FFC36E81000-memory.dmp
              Filesize

              10.8MB

            • memory/4756-5051-0x0000000000D10000-0x0000000000D19000-memory.dmp
              Filesize

              36KB

            • memory/4756-5054-0x0000000002AD0000-0x0000000002ED0000-memory.dmp
              Filesize

              4.0MB

            • memory/4756-5057-0x0000000002AD0000-0x0000000002ED0000-memory.dmp
              Filesize

              4.0MB

            • memory/4756-5077-0x0000000002AD0000-0x0000000002ED0000-memory.dmp
              Filesize

              4.0MB