Resubmissions

19-04-2024 14:52

240419-r82wmafb32 10

19-04-2024 14:48

240419-r6mnxsfa59 10

Analysis

  • max time kernel
    101s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-04-2024 14:52

General

  • Target

    dotNET_Reactor/dotNET_Reactor.exe

  • Size

    13.3MB

  • MD5

    bd73df4cf427511993075f7a16e037a5

  • SHA1

    63f116641b0655f53e93d62ae559d510ed5af134

  • SHA256

    fa0a32d408a8df70ec44f3d2374b058f57b86ff49b8068b8c68f8505d3463970

  • SHA512

    49ad63e65e1f6a454778c904727c948969145eb09457105093af463d933413a7d30437051c7ddb8ded0b46d38b2018a1a78c83af582ab6775bef870057a9dfc3

  • SSDEEP

    393216:xfuP82nPJiP63TKZqkoPrSz4rkZD1K1fU:xqPIPgTxkqrV6YN

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dotNET_Reactor\dotNET_Reactor.exe
    "C:\Users\Admin\AppData\Local\Temp\dotNET_Reactor\dotNET_Reactor.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" /e, /select, "C:\Users\Admin\AppData\Local\Temp\dotNET_Reactor\VSReactorAddin_Secure\VSReactorAddin_Mycc.dll"
      2⤵
        PID:1816
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
      1⤵
        PID:104
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1112
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3920

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Eziriz\.NET Reactor\reactor.nrcfg

          Filesize

          130B

          MD5

          f6f470ab378c9af0cd72ee4d8f36f7a3

          SHA1

          095cefaa8a7d119fd0a28fe2b7dcbec5379d337b

          SHA256

          ac3608a4ba2947ef197bc12f6a6dda90e2351a6918524b0cf7b4926d47dcb36c

          SHA512

          f0d5841b6aa7cba57107432dde1fafb31e1bca327a0a6c57c6ab8a2d606f25019c8edf2a77fbbe435ccc3f61cf72cfd9bd438f82a7f66e381fdf6c9627f5c516

        • memory/4532-8-0x0000000007560000-0x00000000075C6000-memory.dmp

          Filesize

          408KB

        • memory/4532-5-0x0000000007A20000-0x0000000007FC6000-memory.dmp

          Filesize

          5.6MB

        • memory/4532-30-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-4-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-34-0x0000000000EB0000-0x000000000215A000-memory.dmp

          Filesize

          18.7MB

        • memory/4532-0-0x0000000000EB0000-0x000000000215A000-memory.dmp

          Filesize

          18.7MB

        • memory/4532-9-0x00000000083B0000-0x0000000008442000-memory.dmp

          Filesize

          584KB

        • memory/4532-35-0x0000000073CB0000-0x0000000074461000-memory.dmp

          Filesize

          7.7MB

        • memory/4532-22-0x000000000C470000-0x000000000C4A8000-memory.dmp

          Filesize

          224KB

        • memory/4532-23-0x000000000C430000-0x000000000C43E000-memory.dmp

          Filesize

          56KB

        • memory/4532-24-0x000000000CC80000-0x000000000CCC0000-memory.dmp

          Filesize

          256KB

        • memory/4532-1-0x0000000073CB0000-0x0000000074461000-memory.dmp

          Filesize

          7.7MB

        • memory/4532-3-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-2-0x0000000000EB0000-0x000000000215A000-memory.dmp

          Filesize

          18.7MB

        • memory/4532-21-0x000000000C130000-0x000000000C138000-memory.dmp

          Filesize

          32KB

        • memory/4532-37-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-39-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-41-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-45-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-53-0x0000000002B30000-0x0000000002B3A000-memory.dmp

          Filesize

          40KB

        • memory/4532-57-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-58-0x0000000007460000-0x0000000007470000-memory.dmp

          Filesize

          64KB

        • memory/4532-59-0x0000000005140000-0x0000000005146000-memory.dmp

          Filesize

          24KB

        • memory/4532-68-0x0000000000EB0000-0x000000000215A000-memory.dmp

          Filesize

          18.7MB

        • memory/4532-69-0x0000000073CB0000-0x0000000074461000-memory.dmp

          Filesize

          7.7MB