Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240412-en
General
-
Target
tmp.exe
-
Size
5.3MB
-
MD5
de08b70c1b36bce2c90a34b9e5e61f09
-
SHA1
1628635f073c61ad744d406a16d46dfac871c9c2
-
SHA256
432747c04ab478a654328867d7ca806b52fedf1572c74712fa8b7c0edb71df67
-
SHA512
18a30e480ce7d122cfad5a99570042e3bef9e1f9feda1f7be32b273a7248274285c65ac997c90d3d6a950a37b4ea62e6b928bfefc924187c90e32ea571bfd1f5
-
SSDEEP
98304:/+p+LLypykV4RJGIfsv7RynHr/x1leOzcv0nbzKIKFStIJ:/+pMLCYJ/svlUr/x1vzcvib+Ir
Malware Config
Signatures
-
Detect ZGRat V1 36 IoCs
Processes:
resource yara_rule behavioral2/memory/2760-2-0x0000000005B70000-0x0000000006020000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-3-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-4-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-8-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-6-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-10-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-12-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-14-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-16-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-18-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-20-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-22-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-24-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-26-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-28-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-30-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-32-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-34-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-36-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-38-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-40-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-42-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-46-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-44-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-48-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-50-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-52-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-54-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-56-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-58-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-60-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-62-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-64-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/2760-66-0x0000000005B70000-0x000000000601B000-memory.dmp family_zgrat_v1 behavioral2/memory/1576-4904-0x0000000004EE0000-0x0000000005198000-memory.dmp family_zgrat_v1 behavioral2/memory/4288-9818-0x0000000004E20000-0x0000000004F08000-memory.dmp family_zgrat_v1 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
tmp.exedescription pid process target process PID 4508 created 2484 4508 tmp.exe svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation tmp.exe -
Executes dropped EXE 2 IoCs
Processes:
BLHisbnd.exeBLHisbnd.exepid process 1576 BLHisbnd.exe 4288 BLHisbnd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
tmp.exeBLHisbnd.exedescription pid process target process PID 2760 set thread context of 4508 2760 tmp.exe tmp.exe PID 1576 set thread context of 4288 1576 BLHisbnd.exe BLHisbnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2552 4508 WerFault.exe tmp.exe 872 4508 WerFault.exe tmp.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
tmp.exedialer.exepid process 4508 tmp.exe 4508 tmp.exe 4756 dialer.exe 4756 dialer.exe 4756 dialer.exe 4756 dialer.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
tmp.exeBLHisbnd.exeBLHisbnd.exedescription pid process Token: SeDebugPrivilege 2760 tmp.exe Token: SeDebugPrivilege 2760 tmp.exe Token: SeDebugPrivilege 1576 BLHisbnd.exe Token: SeDebugPrivilege 1576 BLHisbnd.exe Token: SeDebugPrivilege 4288 BLHisbnd.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
tmp.exetmp.exeBLHisbnd.exedescription pid process target process PID 2760 wrote to memory of 1576 2760 tmp.exe BLHisbnd.exe PID 2760 wrote to memory of 1576 2760 tmp.exe BLHisbnd.exe PID 2760 wrote to memory of 1576 2760 tmp.exe BLHisbnd.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 2760 wrote to memory of 4508 2760 tmp.exe tmp.exe PID 4508 wrote to memory of 4756 4508 tmp.exe dialer.exe PID 4508 wrote to memory of 4756 4508 tmp.exe dialer.exe PID 4508 wrote to memory of 4756 4508 tmp.exe dialer.exe PID 4508 wrote to memory of 4756 4508 tmp.exe dialer.exe PID 4508 wrote to memory of 4756 4508 tmp.exe dialer.exe PID 1576 wrote to memory of 4288 1576 BLHisbnd.exe BLHisbnd.exe PID 1576 wrote to memory of 4288 1576 BLHisbnd.exe BLHisbnd.exe PID 1576 wrote to memory of 4288 1576 BLHisbnd.exe BLHisbnd.exe PID 1576 wrote to memory of 4288 1576 BLHisbnd.exe BLHisbnd.exe PID 1576 wrote to memory of 4288 1576 BLHisbnd.exe BLHisbnd.exe PID 1576 wrote to memory of 4288 1576 BLHisbnd.exe BLHisbnd.exe PID 1576 wrote to memory of 4288 1576 BLHisbnd.exe BLHisbnd.exe PID 1576 wrote to memory of 4288 1576 BLHisbnd.exe BLHisbnd.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 4443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4508 -ip 45081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4508 -ip 45081⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVABhAGcAcwAuAGUAeABlADsA1⤵
-
C:\Users\Admin\AppData\Local\Remaining\iiyvaqxl\Tags.exeC:\Users\Admin\AppData\Local\Remaining\iiyvaqxl\Tags.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BLHisbnd.exe.logFilesize
716B
MD54f9cc40b2bfe17ac6d8f4e67dad23157
SHA1f3a7e90a2af422f14a8913e2cf03cb5b639fdb18
SHA2563be33b92192f6b439c3b03172670dfd25018b775a0de1bde5f1e81e22a49ab20
SHA512d3d7c1b1fc70cbd7cc4ebe8649bee97a33476e4a0bd67928b124685d793b463208b78982ce592d352ae5a351eaef4d96fde3b02e69860a1c63ab0e53a8a5fa94
-
C:\Users\Admin\AppData\Local\Remaining\iiyvaqxl\Tags.exeFilesize
1KB
MD5aada92e097a3eef16bf8f44e1e9d47e4
SHA1ab9de3b3e094bb40754022084a3215ca61c1c378
SHA2561d6b6b3140cb37ae849b2071da9b1356d4749141bf7308d46a00892484d12565
SHA51241018ca8565e3552a14f4eb6b0fccef2384d567f7585fbab9dc0919314e59b64c93fd52230613ece02a1a850d4e38ab2e6f08126d1fe58518369b6436d68ae3e
-
C:\Users\Admin\AppData\Local\Remaining\iiyvaqxl\Tags.exeFilesize
19KB
MD5ffef91b976a352a6a63dd38ad1ade91d
SHA1fc699dd128ff5a00cba6a1c947f49321c1bdc913
SHA2560e1de47535298bc754662168aad3e464a709573862c0b402830c018766e45a55
SHA512e3b06be62df35bb1908864d9cb8fa9bd97447f9294e09a9f51bd85e90a1e0cc4552bcf769c633dbeb8116d50edf5ea3fc4e8f68817c36086818a4201556a7628
-
C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exeFilesize
3.4MB
MD5e13e6f7986b9d1eff55fe30133592c40
SHA18299d50b76990e9dc7e0a8cc67e2f4d44cb810f5
SHA256407e9094206a37707a368f4cd0103269c50b8c0c03edba87b4f20664d259f207
SHA512bb41209d410ff38c01279d119f646658e363a3055a4f152b6a2c76b9cdb1fb42441b243fa8f7fb7a353a1b0e78c619e499274185f40d8592e43551da46bd97a6
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ubax3fen.odi.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1576-9811-0x0000000005640000-0x0000000005734000-memory.dmpFilesize
976KB
-
memory/1576-9816-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/1576-9809-0x0000000004ED0000-0x0000000004EE0000-memory.dmpFilesize
64KB
-
memory/1576-9810-0x0000000004EC0000-0x0000000004EC1000-memory.dmpFilesize
4KB
-
memory/1576-6229-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/1576-4904-0x0000000004EE0000-0x0000000005198000-memory.dmpFilesize
2.7MB
-
memory/1576-4900-0x0000000000270000-0x00000000005D0000-memory.dmpFilesize
3.4MB
-
memory/1576-4901-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/2760-34-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-16-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-26-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-28-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-30-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-32-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-1-0x0000000000B40000-0x000000000109A000-memory.dmpFilesize
5.4MB
-
memory/2760-36-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-38-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-40-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-42-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-46-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-44-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-48-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-50-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-52-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-54-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-56-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-58-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-60-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-62-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-64-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-66-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-2075-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/2760-4884-0x0000000005B60000-0x0000000005B70000-memory.dmpFilesize
64KB
-
memory/2760-4885-0x0000000001160000-0x0000000001161000-memory.dmpFilesize
4KB
-
memory/2760-4886-0x00000000073D0000-0x00000000076BC000-memory.dmpFilesize
2.9MB
-
memory/2760-4887-0x00000000019A0000-0x00000000019EC000-memory.dmpFilesize
304KB
-
memory/2760-22-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-4899-0x00000000097B0000-0x0000000009D54000-memory.dmpFilesize
5.6MB
-
memory/2760-4902-0x0000000008A10000-0x0000000008A64000-memory.dmpFilesize
336KB
-
memory/2760-20-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-18-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-24-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-4909-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/2760-0-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/2760-2-0x0000000005B70000-0x0000000006020000-memory.dmpFilesize
4.7MB
-
memory/2760-3-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-4-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-8-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-6-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-10-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-12-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/2760-14-0x0000000005B70000-0x000000000601B000-memory.dmpFilesize
4.7MB
-
memory/4288-9815-0x0000000000930000-0x00000000009DC000-memory.dmpFilesize
688KB
-
memory/4288-9818-0x0000000004E20000-0x0000000004F08000-memory.dmpFilesize
928KB
-
memory/4288-9817-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/4288-12033-0x0000000004FD0000-0x0000000004FD8000-memory.dmpFilesize
32KB
-
memory/4288-12034-0x0000000004FE0000-0x0000000005036000-memory.dmpFilesize
344KB
-
memory/4288-12035-0x0000000005270000-0x00000000052D6000-memory.dmpFilesize
408KB
-
memory/4288-12037-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/4456-12056-0x00000000751D0000-0x0000000075980000-memory.dmpFilesize
7.7MB
-
memory/4508-5084-0x0000000004110000-0x0000000004510000-memory.dmpFilesize
4.0MB
-
memory/4508-4912-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4508-5033-0x0000000004110000-0x0000000004510000-memory.dmpFilesize
4.0MB
-
memory/4508-5039-0x0000000004110000-0x0000000004510000-memory.dmpFilesize
4.0MB
-
memory/4744-12047-0x000002BAC53C0000-0x000002BAC53E2000-memory.dmpFilesize
136KB
-
memory/4744-12049-0x000002BAAACA0000-0x000002BAAACB0000-memory.dmpFilesize
64KB
-
memory/4744-12048-0x00007FFC363C0000-0x00007FFC36E81000-memory.dmpFilesize
10.8MB
-
memory/4744-12050-0x000002BAAACA0000-0x000002BAAACB0000-memory.dmpFilesize
64KB
-
memory/4744-12053-0x00007FFC363C0000-0x00007FFC36E81000-memory.dmpFilesize
10.8MB
-
memory/4756-5051-0x0000000000D10000-0x0000000000D19000-memory.dmpFilesize
36KB
-
memory/4756-5054-0x0000000002AD0000-0x0000000002ED0000-memory.dmpFilesize
4.0MB
-
memory/4756-5057-0x0000000002AD0000-0x0000000002ED0000-memory.dmpFilesize
4.0MB
-
memory/4756-5077-0x0000000002AD0000-0x0000000002ED0000-memory.dmpFilesize
4.0MB