Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/04/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe
Resource
win10v2004-20240412-en
General
-
Target
18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe
-
Size
411KB
-
MD5
59b2dff217cce36f03fe67d1fdc23690
-
SHA1
aca10e4c6a14d1a958fcf297dd2d2743fd66f2ec
-
SHA256
18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a
-
SHA512
fb58dda71ed84a5edf6e1e0de001fbb7e5bbd2e0fa5fb2c23655ba93007b645ad2142367710b9e7f480fd2bd0a86fe43b4acaf5915756239eca31325339f8c4b
-
SSDEEP
6144:uLmorbLzyLZ9sZ87lJCqaVmskIctWoPvz/tquYnwuyS3pYea5f31pa:uqo/DZ8jN6LNu/8uYmfva
Malware Config
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/4620-136-0x00000168567F0000-0x000001685A0E8000-memory.dmp family_zgrat_v1 behavioral2/memory/4620-139-0x00000168747E0000-0x00000168748F0000-memory.dmp family_zgrat_v1 behavioral2/memory/4620-143-0x0000016874960000-0x0000016874984000-memory.dmp family_zgrat_v1 -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3380-179-0x0000000001100000-0x00000000011C6000-memory.dmp family_sectoprat -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 3036 u34o.0.exe 244 serversystemNCQ_x64.exe 2244 u34o.1.exe 3244 TrueBurner.exe 3424 TrueBurner.exe -
Loads dropped DLL 2 IoCs
pid Process 3244 TrueBurner.exe 3424 TrueBurner.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3424 set thread context of 4788 3424 TrueBurner.exe 94 PID 4788 set thread context of 3380 4788 cmd.exe 99 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Mondemo_v5.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 236 3036 WerFault.exe 81 1112 4056 WerFault.exe 80 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u34o.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u34o.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u34o.1.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 244 serversystemNCQ_x64.exe 244 serversystemNCQ_x64.exe 3244 TrueBurner.exe 3424 TrueBurner.exe 3424 TrueBurner.exe 4788 cmd.exe 4788 cmd.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3380 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3424 TrueBurner.exe 4788 cmd.exe 4788 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4620 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 3380 MSBuild.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 3244 TrueBurner.exe 3424 TrueBurner.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe 2244 u34o.1.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3244 TrueBurner.exe 3424 TrueBurner.exe 3380 MSBuild.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4056 wrote to memory of 3036 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 81 PID 4056 wrote to memory of 3036 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 81 PID 4056 wrote to memory of 3036 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 81 PID 4056 wrote to memory of 244 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 87 PID 4056 wrote to memory of 244 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 87 PID 4056 wrote to memory of 244 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 87 PID 4056 wrote to memory of 2244 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 88 PID 4056 wrote to memory of 2244 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 88 PID 4056 wrote to memory of 2244 4056 18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe 88 PID 244 wrote to memory of 3244 244 serversystemNCQ_x64.exe 92 PID 244 wrote to memory of 3244 244 serversystemNCQ_x64.exe 92 PID 3244 wrote to memory of 3424 3244 TrueBurner.exe 93 PID 3244 wrote to memory of 3424 3244 TrueBurner.exe 93 PID 3424 wrote to memory of 4788 3424 TrueBurner.exe 94 PID 3424 wrote to memory of 4788 3424 TrueBurner.exe 94 PID 3424 wrote to memory of 4788 3424 TrueBurner.exe 94 PID 3424 wrote to memory of 4788 3424 TrueBurner.exe 94 PID 2244 wrote to memory of 4620 2244 u34o.1.exe 96 PID 2244 wrote to memory of 4620 2244 u34o.1.exe 96 PID 4788 wrote to memory of 3380 4788 cmd.exe 99 PID 4788 wrote to memory of 3380 4788 cmd.exe 99 PID 4788 wrote to memory of 3380 4788 cmd.exe 99 PID 4788 wrote to memory of 3380 4788 cmd.exe 99 PID 4788 wrote to memory of 3380 4788 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe"C:\Users\Admin\AppData\Local\Temp\18eb5d3175e49859fc2b0836c4b7e8d0c6ab4f3d9902641446b0bf60a2755b3a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\u34o.0.exe"C:\Users\Admin\AppData\Local\Temp\u34o.0.exe"2⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 10923⤵
- Program crash
PID:236
-
-
-
C:\Users\Admin\AppData\Local\Temp\serversystemNCQ_x64.exe"C:\Users\Admin\AppData\Local\Temp\serversystemNCQ_x64.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\NBLwriter_test\TrueBurner.exeC:\Users\Admin\AppData\Local\Temp\NBLwriter_test\TrueBurner.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Roaming\NBLwriter_test\TrueBurner.exeC:\Users\Admin\AppData\Roaming\NBLwriter_test\TrueBurner.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3380
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u34o.1.exe"C:\Users\Admin\AppData\Local\Temp\u34o.1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 17162⤵
- Program crash
PID:1112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3036 -ip 30361⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4056 -ip 40561⤵PID:3380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.0MB
MD557b5400654ece4f893bc1108f3b32676
SHA11548133846e49e6f822b695dd472495780bbfe29
SHA256b68e0064d9d879d988c6447c21bf3501ab41e834a14ee67720fad9eed7aceb8c
SHA51271457c82dc12dc53a62e0499115f1779d2195da7906dc0124ac6c856005149b8d094c1408f475d63c5e13291c58db74081be2155a218b2469b00dd897502df6c
-
Filesize
1.4MB
MD509c62735caec5e8de31f4caad2f8654e
SHA1726dd82e912a26551b90bb333eb2c8e41a96b4b6
SHA25617e2682e12b31793244d6bfb60ceecf06ca1908b54fda24afdd4700c795c95e8
SHA512fbd269c8375d1f474d3179cca41bd1de8e5a100163fa8911ee72e1bb39315e450d4b66ed187d091a41721b6c3b3a122efc89065b1113f0f4ff5020595099ac20
-
Filesize
5.6MB
MD50add242030c1c5e5e312042f2bee2e72
SHA18e75f3724d75df8d67e1fd555912da332da7f5d1
SHA2563e190f160218ad78c85c169dfd0828d36e4a366a3e2a61337391f0d7599a7558
SHA51207860926b25c2e091313a57e0f9d60879229cab9516488567d617649d86c5b04deb3b1b047dd6143d3ced760086a5af4fc75a7c0e534d48ada0b7ec59dcf39c6
-
Filesize
4.0MB
MD50cf98626c6a2922bb6a4d456e47d0608
SHA16b71cfc583b337d40574415e9bb91b76296bab7d
SHA256b4316ff3c60dad0a752aacf0fc88296bcc9c4dac93513d1a6dc1461f17156750
SHA51227c37c9a0fa1ea76ed6ae9c5389012008f9d1b5523214d2d3702f9305ffa1edcc78a415641cac17adbd581bc57951e7cfdc67be5ad3de6ad0185e25a325f9465
-
Filesize
53KB
MD521dc5133ac6f22266c77c65ad45b2677
SHA146c0ad029268c04c7ae9d5ec99381abfb789bdaa
SHA256fe6b0bda2f3d946a786f9b33d641134e47a2418b4ff2aeb44bfd37b405765a01
SHA5128257a818a916ca2a96a48a31cc557cfb90e90b501999232fd0b74767b40c3f9fcc45ffd807147bc47a8da09714335a86d04c2f7f8313bdba0da9a51c6abb9c3e
-
Filesize
1.2MB
MD5d6caca3c4dd5dad51521b8b0811a7ec4
SHA1049a4f59d387f7d70be992a90711e43902390a7a
SHA25621d4bec89486481a8d49b49f75e9e5cba53edfe8735f57c1f36285daa0a33563
SHA5122181e441fb50e537e0e52c6229c9c330ab1eb690cfd66e6581ae314fab303ef65a629c917eaf0eef32505fe227254818cdfde5c957d73339c716f75d29bbcfab
-
Filesize
3KB
MD59719f55d91e81264a38bff46fad6d4b5
SHA1ec3fbc492593d31d158c18df0ef0c47402b4eccc
SHA2569a859b61affa8d97d50bfb1104a87879723ba387061166eae9d7423270d0bacc
SHA5128679710acd1090e1d96f97caed1d26bb0834bd9a269691ba62dc236308e1e2124d5e24e9eb70b6099bfdf52667aed93ac595b1f89f0c0c9391706e80ac3eb720
-
Filesize
10.9MB
MD5e8295a7ef2d88aa3a16361a5e53feb3c
SHA1b07a32538e0540a467203f343bb64e6536d36730
SHA25618ec7b686d8ff469e63b2568210f5886e9e5512a651137e7fb5e8009a41a54be
SHA512fc4da2e0f157012fa88f42d7855405e2b078a61548500501ca509937fea78a3024b14a36ea59207a1d2c0a46be54ca3919be578a01d6bd93725b87b3151d6157
-
Filesize
20KB
MD542c395b8db48b6ce3d34c301d1eba9d5
SHA1b7cfa3de344814bec105391663c0df4a74310996
SHA2565644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d
SHA5127b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
270KB
MD5016d1899b81b63815302c7cb9618484a
SHA1ff808fb01a8e4d90f6da4d84194dbf085f0d20b4
SHA25695156ff902d4bab5c90c9e932d4d619b1c2caaca071523bdaf4adea1ca96c2ff
SHA512c2515006729cdb3e99de4eb87823d88a3e0c89f1918d3f16544ec6ab20126e309a54a6fb5411293db17668677cfb29a2ae1fa0912f596efc6bbbff363353b8d5
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954