Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 04:47

General

  • Target

    ShippingOrder_ GSHS2400052.exe

  • Size

    185KB

  • MD5

    5a9bf748b2b3431b39e5a8fea6feaa80

  • SHA1

    08a558eb27295a8e3f70a7a05cf958e2907fd970

  • SHA256

    3801a5a9dd369ed4fefc953437c2059d00da7b98fabd3ec68262ef48f9718bcf

  • SHA512

    caa42a2ea17c2ca98812478dd5739479be6fee0c243401c08003092749b1848b4090b7470f9f6641219b9696cccfecebfc2497e2d7fc8200fb833a13bbe0e022

  • SSDEEP

    3072:fcGYpXxZwveS8lH9YYLI42pVWse3Ns6G2FxgiNCJmPG04:EGYpvwveMYpBRFxgvh

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ShippingOrder_ GSHS2400052.exe
    "C:\Users\Admin\AppData\Local\Temp\ShippingOrder_ GSHS2400052.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:2452
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
          PID:2064
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
            PID:2684
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            2⤵
              PID:2720
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              2⤵
                PID:2716
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 1732 -s 1740
                2⤵
                  PID:2564

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1732-0-0x0000000000A40000-0x0000000000A74000-memory.dmp

                      Filesize

                      208KB

                    • memory/1732-1-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1732-2-0x000000001B060000-0x000000001B0E0000-memory.dmp

                      Filesize

                      512KB

                    • memory/1732-3-0x000007FEF50D0000-0x000007FEF5ABC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1732-4-0x000000001B060000-0x000000001B0E0000-memory.dmp

                      Filesize

                      512KB

                    • memory/1732-5-0x0000000000300000-0x000000000031C000-memory.dmp

                      Filesize

                      112KB