Analysis

  • max time kernel
    118s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 07:24

General

  • Target

    3bcaee9fbb27f5b111fc1bab7ddf995662d0f1bd7251f788cf61e470a663bc21.exe

  • Size

    1.6MB

  • MD5

    8ea200d639611b48b5eec7973c69ed3c

  • SHA1

    a1013b8ee4115f2cba29787eded20e5e6079b3c0

  • SHA256

    3bcaee9fbb27f5b111fc1bab7ddf995662d0f1bd7251f788cf61e470a663bc21

  • SHA512

    53b24b0f2a0e9047e7f672f8c7dada1ac1f6ab15aa6976515dcca8cfc03afa1bd3fbf788475c9b7d5f8617ad70b32a7974f8f2bd77c9f6c79bcd3b30cdd6763e

  • SSDEEP

    24576:PD9R6DRIuUt0HfUXl+L83+uNhK5ewp6Y9Ly2KUVvqBML1dSk/uyEklP8/0:PDilCH3RNhqewp/92zUMBMOSIkl

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bcaee9fbb27f5b111fc1bab7ddf995662d0f1bd7251f788cf61e470a663bc21.exe
    "C:\Users\Admin\AppData\Local\Temp\3bcaee9fbb27f5b111fc1bab7ddf995662d0f1bd7251f788cf61e470a663bc21.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rFDRf34iLV.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2508
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:2480
          • C:\Users\Admin\AppData\Local\Temp\3bcaee9fbb27f5b111fc1bab7ddf995662d0f1bd7251f788cf61e470a663bc21.exe
            "C:\Users\Admin\AppData\Local\Temp\3bcaee9fbb27f5b111fc1bab7ddf995662d0f1bd7251f788cf61e470a663bc21.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2616

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dwm.exe

              Filesize

              1.6MB

              MD5

              8ea200d639611b48b5eec7973c69ed3c

              SHA1

              a1013b8ee4115f2cba29787eded20e5e6079b3c0

              SHA256

              3bcaee9fbb27f5b111fc1bab7ddf995662d0f1bd7251f788cf61e470a663bc21

              SHA512

              53b24b0f2a0e9047e7f672f8c7dada1ac1f6ab15aa6976515dcca8cfc03afa1bd3fbf788475c9b7d5f8617ad70b32a7974f8f2bd77c9f6c79bcd3b30cdd6763e

            • C:\Users\Admin\AppData\Local\Temp\rFDRf34iLV.bat

              Filesize

              278B

              MD5

              9cb5c9f43a45e0aa7bf04ad56e554161

              SHA1

              8e6ccee41c892ec63f1db7845ebd3acfe19c73d4

              SHA256

              91f80a00c88262638039091e28810813e9405cdcf83b6c58c38123bed6faf538

              SHA512

              f7bbb3969743099141afc00fc9ea356b8145ff9aa8348b4042f16136f279d846db3959612cd88ed47b86660d29749e7c261437f7d98eb69aeb7ff37452e67cba

            • memory/640-0-0x0000000000DA0000-0x0000000000F38000-memory.dmp

              Filesize

              1.6MB

            • memory/640-1-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

              Filesize

              9.9MB

            • memory/640-2-0x000000001AA30000-0x000000001AAB0000-memory.dmp

              Filesize

              512KB

            • memory/640-3-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/640-20-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

              Filesize

              9.9MB

            • memory/2616-22-0x000007FEF51B0000-0x000007FEF5B9C000-memory.dmp

              Filesize

              9.9MB

            • memory/2616-21-0x0000000000ED0000-0x0000000001068000-memory.dmp

              Filesize

              1.6MB

            • memory/2616-24-0x00000000003B0000-0x00000000003B1000-memory.dmp

              Filesize

              4KB

            • memory/2616-23-0x0000000000C40000-0x0000000000CC0000-memory.dmp

              Filesize

              512KB

            • memory/2616-26-0x0000000000C40000-0x0000000000CC0000-memory.dmp

              Filesize

              512KB

            • memory/2616-25-0x0000000000C40000-0x0000000000CC0000-memory.dmp

              Filesize

              512KB

            • memory/2616-27-0x0000000000C40000-0x0000000000CC0000-memory.dmp

              Filesize

              512KB

            • memory/2616-29-0x0000000000C40000-0x0000000000CC0000-memory.dmp

              Filesize

              512KB

            • memory/2616-28-0x000007FEF51B0000-0x000007FEF5B9C000-memory.dmp

              Filesize

              9.9MB

            • memory/2616-30-0x0000000000C40000-0x0000000000CC0000-memory.dmp

              Filesize

              512KB

            • memory/2616-31-0x0000000000C40000-0x0000000000CC0000-memory.dmp

              Filesize

              512KB