Analysis

  • max time kernel
    123s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 14:26

General

  • Target

    d5a637dbba35358ada6021003d135a7ebfaa36f4de9646635bfdfc35d9077af4.exe

  • Size

    725KB

  • MD5

    5db47cc0eb5dae97ad8ea7d3ccbf3f8c

  • SHA1

    444f8028c412c7661c3204e82da703ffdc607291

  • SHA256

    d5a637dbba35358ada6021003d135a7ebfaa36f4de9646635bfdfc35d9077af4

  • SHA512

    ab5ae0c399fb4b475d85cf0c07d7c2d4aeae7ac7c2b53b8c6b26afc3eb007dfe3fdde03e695a78f0f8d1dd6648c7378d5f5063732b74bbe0d2579040a59d76d2

  • SSDEEP

    12288:d3IU8S6eUd/rqMtJwy8cpe/8pg3P20aweKkKfncC8AHLG0JlB99e78:FItSAdzltJwKpyuokK/cC8o9Bl

Malware Config

Signatures

  • Contains code to disable Windows Defender 7 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect ZGRat V1 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 9 IoCs
  • Modifies security service 2 TTPs 4 IoCs
  • Quasar RAT 3 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar payload 7 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5a637dbba35358ada6021003d135a7ebfaa36f4de9646635bfdfc35d9077af4.exe
    "C:\Users\Admin\AppData\Local\Temp\d5a637dbba35358ada6021003d135a7ebfaa36f4de9646635bfdfc35d9077af4.exe"
    1⤵
    • Quasar RAT
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\d5a637dbba35358ada6021003d135a7ebfaa36f4de9646635bfdfc35d9077af4.exe
      "C:\Users\Admin\AppData\Local\Temp\d5a637dbba35358ada6021003d135a7ebfaa36f4de9646635bfdfc35d9077af4.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Modifies security service
      • UAC bypass
      • Windows security bypass
      • Loads dropped DLL
      • Windows security modification
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2740
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "\Microsoft\Windows\System\Pev44\Files\IlemetryLogtek" /SC MINUTE /MO 3 /RL HIGHEST /tr "C:\Users\Admin\AppData\Local\Temp\d5a637dbba35358ada6021003d135a7ebfaa36f4de9646635bfdfc35d9077af4.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2428
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /delete /tn "IlemetryLogtek" /f
        3⤵
          PID:2824
        • C:\Windows\SysWOW64\vssadmin.exe
          "vssadmin" delete shadows /all /quiet
          3⤵
          • Interacts with shadow copies
          PID:1564
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2668
        • C:\Users\Admin\AppData\Roaming\Gres\Verek.exe
          "C:\Users\Admin\AppData\Roaming\Gres\Verek.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Users\Admin\AppData\Roaming\Gres\Verek.exe
            "C:\Users\Admin\AppData\Roaming\Gres\Verek.exe"
            4⤵
            • Modifies Windows Defender Real-time Protection settings
            • Modifies security service
            • UAC bypass
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2020
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "\Microsoft\Windows\System\Pev44\Files\IlemetryLogtek" /SC MINUTE /MO 3 /RL HIGHEST /tr "C:\Users\Admin\AppData\Roaming\Gres\Verek.exe" /f
              5⤵
              • Creates scheduled task(s)
              PID:764
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /delete /tn "IlemetryLogtek" /f
              5⤵
                PID:356
              • C:\Windows\SysWOW64\vssadmin.exe
                "vssadmin" delete shadows /all /quiet
                5⤵
                • Interacts with shadow copies
                PID:696
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell" Get-MpPreference -verbose
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1184
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:884

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Gres\Verek.exe

              Filesize

              725KB

              MD5

              5db47cc0eb5dae97ad8ea7d3ccbf3f8c

              SHA1

              444f8028c412c7661c3204e82da703ffdc607291

              SHA256

              d5a637dbba35358ada6021003d135a7ebfaa36f4de9646635bfdfc35d9077af4

              SHA512

              ab5ae0c399fb4b475d85cf0c07d7c2d4aeae7ac7c2b53b8c6b26afc3eb007dfe3fdde03e695a78f0f8d1dd6648c7378d5f5063732b74bbe0d2579040a59d76d2

            • C:\Users\Admin\AppData\Roaming\Gres\settings.xml

              Filesize

              64B

              MD5

              cf4d033219f987c0a057da5f64d74fae

              SHA1

              a5605c0ea0193022cd71190e2dc794381f416d94

              SHA256

              127a80bd33231ee856a83eddfeaabb22a202a369fe429c8ff5430038fd132876

              SHA512

              601cf72b779711e420ae0e0292bd3834e8ccc34661f930db5cdc94a2d788147404447cc4ead19a5c74a930fd3a11a415dabe882b0033d167546f395f59383008

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              3d07a781d9e35e766b8a16bd04267baf

              SHA1

              560d956454b1aace9e87474fa56f710d85cfdf26

              SHA256

              d5f3c85b6bcf51b9f739f1180a1a790b3915b876a3c294dd82d535139a8b3c50

              SHA512

              1f9c041f78a7c6dce94f967ba9d7de6f217e6a1e74b124564d3fdee42f7c25e05ecd3f4924244e77dfe1e49f7c62a5cc621c645cfc1a83cf1db514c0227c046f

            • memory/1184-78-0x000000006EF30000-0x000000006F4DB000-memory.dmp

              Filesize

              5.7MB

            • memory/1184-73-0x000000006EF30000-0x000000006F4DB000-memory.dmp

              Filesize

              5.7MB

            • memory/1184-74-0x0000000002A70000-0x0000000002AB0000-memory.dmp

              Filesize

              256KB

            • memory/1184-75-0x000000006EF30000-0x000000006F4DB000-memory.dmp

              Filesize

              5.7MB

            • memory/1184-76-0x0000000002A70000-0x0000000002AB0000-memory.dmp

              Filesize

              256KB

            • memory/1184-77-0x0000000002A70000-0x0000000002AB0000-memory.dmp

              Filesize

              256KB

            • memory/1580-61-0x0000000074960000-0x000000007504E000-memory.dmp

              Filesize

              6.9MB

            • memory/1580-42-0x0000000074960000-0x000000007504E000-memory.dmp

              Filesize

              6.9MB

            • memory/1580-43-0x00000000008A0000-0x000000000095C000-memory.dmp

              Filesize

              752KB

            • memory/1580-44-0x00000000047B0000-0x00000000047F0000-memory.dmp

              Filesize

              256KB

            • memory/2020-81-0x00000000048D0000-0x0000000004910000-memory.dmp

              Filesize

              256KB

            • memory/2020-80-0x0000000074960000-0x000000007504E000-memory.dmp

              Filesize

              6.9MB

            • memory/2020-53-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2020-62-0x0000000074960000-0x000000007504E000-memory.dmp

              Filesize

              6.9MB

            • memory/2300-18-0x0000000074960000-0x000000007504E000-memory.dmp

              Filesize

              6.9MB

            • memory/2300-2-0x00000000004D0000-0x0000000000510000-memory.dmp

              Filesize

              256KB

            • memory/2300-3-0x00000000004B0000-0x00000000004C8000-memory.dmp

              Filesize

              96KB

            • memory/2300-0-0x0000000000990000-0x0000000000A4C000-memory.dmp

              Filesize

              752KB

            • memory/2300-4-0x00000000003C0000-0x00000000003C8000-memory.dmp

              Filesize

              32KB

            • memory/2300-5-0x00000000003E0000-0x00000000003EA000-memory.dmp

              Filesize

              40KB

            • memory/2300-1-0x0000000074960000-0x000000007504E000-memory.dmp

              Filesize

              6.9MB

            • memory/2300-6-0x0000000000310000-0x00000000003A4000-memory.dmp

              Filesize

              592KB

            • memory/2668-32-0x00000000029D0000-0x0000000002A10000-memory.dmp

              Filesize

              256KB

            • memory/2668-29-0x000000006EF70000-0x000000006F51B000-memory.dmp

              Filesize

              5.7MB

            • memory/2668-33-0x000000006EF70000-0x000000006F51B000-memory.dmp

              Filesize

              5.7MB

            • memory/2668-31-0x000000006EF70000-0x000000006F51B000-memory.dmp

              Filesize

              5.7MB

            • memory/2668-30-0x00000000029D0000-0x0000000002A10000-memory.dmp

              Filesize

              256KB

            • memory/2740-20-0x0000000004BA0000-0x0000000004BE0000-memory.dmp

              Filesize

              256KB

            • memory/2740-19-0x0000000074960000-0x000000007504E000-memory.dmp

              Filesize

              6.9MB

            • memory/2740-41-0x0000000074960000-0x000000007504E000-memory.dmp

              Filesize

              6.9MB

            • memory/2740-9-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB

            • memory/2740-10-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB

            • memory/2740-17-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB

            • memory/2740-15-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB

            • memory/2740-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2740-13-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB

            • memory/2740-8-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB

            • memory/2740-7-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB