Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
669773f95714fd6b67967bea28ec1653.exe
Resource
win7-20240221-en
General
-
Target
669773f95714fd6b67967bea28ec1653.exe
-
Size
415KB
-
MD5
669773f95714fd6b67967bea28ec1653
-
SHA1
8326f317195f575ce102a800c72dc7225ddfc710
-
SHA256
1cb385eb8f12a6ffe0f5736416c89bda36f347803ca0f0ef690d82eb5c712d62
-
SHA512
478ec81407b3653ec3204123b91dd5dcc0ad4ddf28e5e8eef906266712ea35dac335c982b552260e809dbf5a71039e912ea0a0ae1381213f59c87f65e0493273
-
SSDEEP
6144:S+fjuFWTbPVFlAB7ZX63pj56LXMiY1A9QxIXiJrK:S+fCFWTzVFlCZK5WXyPxXK
Malware Config
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/1344-171-0x000001CC6BA20000-0x000001CC6F318000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-173-0x000001CC71B60000-0x000001CC71C70000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-177-0x000001CC71AF0000-0x000001CC71B14000-memory.dmp family_zgrat_v1 -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3064-109-0x0000000000F00000-0x0000000000FC6000-memory.dmp family_sectoprat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation 669773f95714fd6b67967bea28ec1653.exe Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation u1h8.1.exe -
Executes dropped EXE 5 IoCs
pid Process 2332 u1h8.0.exe 5092 Qg_Appv5.exe 3092 ptInst.exe 1512 ptInst.exe 4312 u1h8.1.exe -
Loads dropped DLL 7 IoCs
pid Process 3092 ptInst.exe 3092 ptInst.exe 3092 ptInst.exe 3092 ptInst.exe 1512 ptInst.exe 1512 ptInst.exe 1512 ptInst.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1512 set thread context of 4024 1512 ptInst.exe 107 PID 4024 set thread context of 3064 4024 cmd.exe 116 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1764 2332 WerFault.exe 89 5032 1916 WerFault.exe 84 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1h8.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1h8.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1h8.1.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 5092 Qg_Appv5.exe 5092 Qg_Appv5.exe 5092 Qg_Appv5.exe 5092 Qg_Appv5.exe 3092 ptInst.exe 1512 ptInst.exe 1512 ptInst.exe 4024 cmd.exe 4024 cmd.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1512 ptInst.exe 4024 cmd.exe 4024 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3064 MSBuild.exe Token: SeDebugPrivilege 1344 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe 4312 u1h8.1.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2332 1916 669773f95714fd6b67967bea28ec1653.exe 89 PID 1916 wrote to memory of 2332 1916 669773f95714fd6b67967bea28ec1653.exe 89 PID 1916 wrote to memory of 2332 1916 669773f95714fd6b67967bea28ec1653.exe 89 PID 1916 wrote to memory of 5092 1916 669773f95714fd6b67967bea28ec1653.exe 104 PID 1916 wrote to memory of 5092 1916 669773f95714fd6b67967bea28ec1653.exe 104 PID 1916 wrote to memory of 5092 1916 669773f95714fd6b67967bea28ec1653.exe 104 PID 5092 wrote to memory of 3092 5092 Qg_Appv5.exe 105 PID 5092 wrote to memory of 3092 5092 Qg_Appv5.exe 105 PID 5092 wrote to memory of 3092 5092 Qg_Appv5.exe 105 PID 3092 wrote to memory of 1512 3092 ptInst.exe 106 PID 3092 wrote to memory of 1512 3092 ptInst.exe 106 PID 3092 wrote to memory of 1512 3092 ptInst.exe 106 PID 1512 wrote to memory of 4024 1512 ptInst.exe 107 PID 1512 wrote to memory of 4024 1512 ptInst.exe 107 PID 1512 wrote to memory of 4024 1512 ptInst.exe 107 PID 1512 wrote to memory of 4024 1512 ptInst.exe 107 PID 4024 wrote to memory of 3064 4024 cmd.exe 116 PID 4024 wrote to memory of 3064 4024 cmd.exe 116 PID 4024 wrote to memory of 3064 4024 cmd.exe 116 PID 4024 wrote to memory of 3064 4024 cmd.exe 116 PID 4024 wrote to memory of 3064 4024 cmd.exe 116 PID 1916 wrote to memory of 4312 1916 669773f95714fd6b67967bea28ec1653.exe 119 PID 1916 wrote to memory of 4312 1916 669773f95714fd6b67967bea28ec1653.exe 119 PID 1916 wrote to memory of 4312 1916 669773f95714fd6b67967bea28ec1653.exe 119 PID 4312 wrote to memory of 1344 4312 u1h8.1.exe 124 PID 4312 wrote to memory of 1344 4312 u1h8.1.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\669773f95714fd6b67967bea28ec1653.exe"C:\Users\Admin\AppData\Local\Temp\669773f95714fd6b67967bea28ec1653.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\u1h8.0.exe"C:\Users\Admin\AppData\Local\Temp\u1h8.0.exe"2⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 10123⤵
- Program crash
PID:1764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1h8.1.exe"C:\Users\Admin\AppData\Local\Temp\u1h8.1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 12162⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2332 -ip 23321⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1916 -ip 19161⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD513418f74a7ce25cdd6997c9fcb718a0e
SHA1f4c880821fee72c37c882b1e8ebf100efcafe31c
SHA256a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0
SHA51259017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1
-
Filesize
1.4MB
MD57efa6283a56fc681004fd26b9d091249
SHA1232ce2f6b796911313559605da80e6febe743b03
SHA2564a12ff1111a3e0c6529cb9306e28a334f592cc0f3cf3b3ff764c18aee7a02136
SHA512bc1959e5dbb61754ce97ada6fba8bc24a5e3b587c3784f0da810201824123b31ad3213e7b23376f912369094d26250acd5eda059eea0ec12e2e2a4afa4ef71ba
-
Filesize
7.6MB
MD5862bf3003dca41d88ac49a6846149623
SHA1b34f1d42dd0649d6b83f9a92124a554f48df0434
SHA25650c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c
SHA512fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969
-
Filesize
81KB
MD516b26bc43943531d7d7e379632ed4e63
SHA1565287de39649e59e653a3612478c2186096d70a
SHA256346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517
SHA512b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc
-
Filesize
590KB
MD563206e3b4f1fa4dcfbe1f2cc5d0c4e9d
SHA1fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924
SHA2568f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885
SHA51232bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6
-
Filesize
79KB
MD58e1bbc6d6c4d207393b59853f73945ae
SHA1b66d632eae41267175bf5332d43a785dd929d79f
SHA256b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279
SHA5121b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001
-
Filesize
427KB
MD571a0aa2d05e9174cefd568347bd9c70f
SHA1cb9247a0fa59e47f72df7d1752424b33a903bbb2
SHA256fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47
SHA5126e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a
-
Filesize
938KB
MD5b15bac961f62448c872e1dc6d3931016
SHA11dcb61babb08fe5db711e379cb67335357a5db82
SHA256bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5
SHA512932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370
-
Filesize
1.3MB
MD53bee67dd0e04559c8fdc7761336dee47
SHA1027ef9dca01fb928db79e57b418130165f06ed5f
SHA25657745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812
SHA51235fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce
-
Filesize
270KB
MD5e04ed0504fa27e027f881d56374ad908
SHA191d403c72d54827fccd12fe28738db10c90f574e
SHA256e96794b68e92761704f3b5178a35816a7d856b789a9d076984bb75486e3afa0d
SHA512cbd4537b2103f302b20564583520f3ffc44cb56a8eb849e7db00ce93c868b1ff4449c86f01380f33028397b32e78d8f671b3676d70b66368d39c89c9efd867b0
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954