Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 09:06

General

  • Target

    ltrt.exe

  • Size

    180KB

  • MD5

    f333f0a16c7bb7129e6659e145525be6

  • SHA1

    e6d057c501381d3604e24d73edc81254ddf7bbb1

  • SHA256

    5bca86ec4ed35175dd33db2943f1fc7839ae3565229fc5fd9227bbd9f0aa637b

  • SHA512

    34b31dffdbb53cf90efaf00847777ced46b888825bffc882ecf694def7203d7a3656cde1cb2279b84200afca42f1de2ab8b0c7c8c367c18fe796a146ddb61b33

  • SSDEEP

    3072:ZJgCU1m6NcbkgbpA9QPqym0Mxqwg0QSNU6Ji3G8uNLt9N18Y+ECc:Zuz1pNc8WGQwgVSri3G8uP9N/+

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ltrt.exe
    "C:\Users\Admin\AppData\Local\Temp\ltrt.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\ltrt.exe
      "C:\Users\Admin\AppData\Local\Temp\ltrt.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1832
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVAB5AHAAZQAuAGUAeABlADsA
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4488
  • C:\Users\Admin\AppData\Local\BaseType\bkjbkd\Type.exe
    C:\Users\Admin\AppData\Local\BaseType\bkjbkd\Type.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Users\Admin\AppData\Local\BaseType\bkjbkd\Type.exe
      "C:\Users\Admin\AppData\Local\BaseType\bkjbkd\Type.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2024
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVAB5AHAAZQAuAGUAeABlADsA
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3688

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\BaseType\bkjbkd\Type.exe

          Filesize

          180KB

          MD5

          f333f0a16c7bb7129e6659e145525be6

          SHA1

          e6d057c501381d3604e24d73edc81254ddf7bbb1

          SHA256

          5bca86ec4ed35175dd33db2943f1fc7839ae3565229fc5fd9227bbd9f0aa637b

          SHA512

          34b31dffdbb53cf90efaf00847777ced46b888825bffc882ecf694def7203d7a3656cde1cb2279b84200afca42f1de2ab8b0c7c8c367c18fe796a146ddb61b33

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ltrt.exe.log

          Filesize

          1KB

          MD5

          b78f0793c3ef1d417e56d34b656b40bb

          SHA1

          4a622f8022516098cb5aae35a5953bde039111a7

          SHA256

          67090a383e35cf075d5c0f0c1d78c4e4b805de6aa951b5d4dd01fd9ae8ccdcfb

          SHA512

          ab3fb91602bd6f070d9b060da4a26d01869e9b23e319db9164d2e251b2c47db690da0f832e69a45c03bc99919942ef516a0b157cfa0aaea84e64b1e90ae5b933

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          d85ba6ff808d9e5444a4b369f5bc2730

          SHA1

          31aa9d96590fff6981b315e0b391b575e4c0804a

          SHA256

          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

          SHA512

          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          944B

          MD5

          77d622bb1a5b250869a3238b9bc1402b

          SHA1

          d47f4003c2554b9dfc4c16f22460b331886b191b

          SHA256

          f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

          SHA512

          d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_304fcmns.2qk.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1832-4896-0x0000012FFB7B0000-0x0000012FFB896000-memory.dmp

          Filesize

          920KB

        • memory/1832-4895-0x0000012FFB8D0000-0x0000012FFB8E0000-memory.dmp

          Filesize

          64KB

        • memory/1832-4892-0x0000000000400000-0x00000000004AA000-memory.dmp

          Filesize

          680KB

        • memory/1832-4894-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/1832-7116-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/1832-7114-0x0000012FFAF70000-0x0000012FFAFC6000-memory.dmp

          Filesize

          344KB

        • memory/1832-7113-0x0000012FFAEE0000-0x0000012FFAEE8000-memory.dmp

          Filesize

          32KB

        • memory/2024-15961-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/2024-14244-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/2400-57-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-4885-0x0000026998490000-0x0000026998491000-memory.dmp

          Filesize

          4KB

        • memory/2400-17-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-19-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-21-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-23-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-25-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-27-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-29-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-31-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-33-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-35-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-37-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-39-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-41-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-45-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-43-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-47-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-49-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-51-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-53-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-55-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-13-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-59-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-61-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-63-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-65-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-67-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-2014-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/2400-15-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-11-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-9-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-7-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-4886-0x0000026998A40000-0x0000026998B34000-memory.dmp

          Filesize

          976KB

        • memory/2400-4887-0x0000026998B30000-0x0000026998B7C000-memory.dmp

          Filesize

          304KB

        • memory/2400-4888-0x0000026998B80000-0x0000026998BD4000-memory.dmp

          Filesize

          336KB

        • memory/2400-4893-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/2400-0-0x00000269FDF00000-0x00000269FDF2E000-memory.dmp

          Filesize

          184KB

        • memory/2400-1-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/2400-5-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-2-0x0000026998530000-0x0000026998540000-memory.dmp

          Filesize

          64KB

        • memory/2400-3-0x0000026998780000-0x0000026998A38000-memory.dmp

          Filesize

          2.7MB

        • memory/2400-4-0x0000026998780000-0x0000026998A32000-memory.dmp

          Filesize

          2.7MB

        • memory/3688-15558-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/3688-14732-0x0000022A793F0000-0x0000022A79400000-memory.dmp

          Filesize

          64KB

        • memory/3688-14731-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/4488-7131-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/4488-7117-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/4488-7118-0x000001FB73F60000-0x000001FB73F70000-memory.dmp

          Filesize

          64KB

        • memory/4488-7128-0x000001FB745C0000-0x000001FB745E2000-memory.dmp

          Filesize

          136KB

        • memory/4880-14243-0x0000021034270000-0x0000021034280000-memory.dmp

          Filesize

          64KB

        • memory/4880-14245-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/4880-12024-0x0000021034270000-0x0000021034280000-memory.dmp

          Filesize

          64KB

        • memory/4880-12023-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/4888-7134-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/4888-12025-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/4888-12018-0x0000016B365C0000-0x0000016B365C1000-memory.dmp

          Filesize

          4KB

        • memory/4888-10058-0x0000016B36450000-0x0000016B36460000-memory.dmp

          Filesize

          64KB

        • memory/4888-9446-0x00007FFE22E80000-0x00007FFE23941000-memory.dmp

          Filesize

          10.8MB

        • memory/4888-7135-0x0000016B36450000-0x0000016B36460000-memory.dmp

          Filesize

          64KB