Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 13:16

General

  • Target

    669773f95714fd6b67967bea28ec1653.exe

  • Size

    415KB

  • MD5

    669773f95714fd6b67967bea28ec1653

  • SHA1

    8326f317195f575ce102a800c72dc7225ddfc710

  • SHA256

    1cb385eb8f12a6ffe0f5736416c89bda36f347803ca0f0ef690d82eb5c712d62

  • SHA512

    478ec81407b3653ec3204123b91dd5dcc0ad4ddf28e5e8eef906266712ea35dac335c982b552260e809dbf5a71039e912ea0a0ae1381213f59c87f65e0493273

  • SSDEEP

    6144:S+fjuFWTbPVFlAB7ZX63pj56LXMiY1A9QxIXiJrK:S+fCFWTzVFlCZK5WXyPxXK

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\669773f95714fd6b67967bea28ec1653.exe
    "C:\Users\Admin\AppData\Local\Temp\669773f95714fd6b67967bea28ec1653.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\u1h8.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u1h8.0.exe"
      2⤵
      • Executes dropped EXE
      PID:2332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 1012
        3⤵
        • Program crash
        PID:1764
    • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe
      "C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3092
        • C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1512
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4024
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3064
    • C:\Users\Admin\AppData\Local\Temp\u1h8.1.exe
      "C:\Users\Admin\AppData\Local\Temp\u1h8.1.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4312
      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
        "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1344
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 1216
      2⤵
      • Program crash
      PID:5032
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2332 -ip 2332
    1⤵
      PID:2656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1916 -ip 1916
      1⤵
        PID:2136

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\8f8944c7

        Filesize

        3.8MB

        MD5

        13418f74a7ce25cdd6997c9fcb718a0e

        SHA1

        f4c880821fee72c37c882b1e8ebf100efcafe31c

        SHA256

        a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0

        SHA512

        59017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1

      • C:\Users\Admin\AppData\Local\Temp\9f51529e

        Filesize

        1.4MB

        MD5

        7efa6283a56fc681004fd26b9d091249

        SHA1

        232ce2f6b796911313559605da80e6febe743b03

        SHA256

        4a12ff1111a3e0c6529cb9306e28a334f592cc0f3cf3b3ff764c18aee7a02136

        SHA512

        bc1959e5dbb61754ce97ada6fba8bc24a5e3b587c3784f0da810201824123b31ad3213e7b23376f912369094d26250acd5eda059eea0ec12e2e2a4afa4ef71ba

      • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe

        Filesize

        7.6MB

        MD5

        862bf3003dca41d88ac49a6846149623

        SHA1

        b34f1d42dd0649d6b83f9a92124a554f48df0434

        SHA256

        50c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c

        SHA512

        fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\VCRUNTIME140.dll

        Filesize

        81KB

        MD5

        16b26bc43943531d7d7e379632ed4e63

        SHA1

        565287de39649e59e653a3612478c2186096d70a

        SHA256

        346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

        SHA512

        b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\WCLDll.dll

        Filesize

        590KB

        MD5

        63206e3b4f1fa4dcfbe1f2cc5d0c4e9d

        SHA1

        fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924

        SHA256

        8f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885

        SHA512

        32bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\cosmetician.mpeg

        Filesize

        79KB

        MD5

        8e1bbc6d6c4d207393b59853f73945ae

        SHA1

        b66d632eae41267175bf5332d43a785dd929d79f

        SHA256

        b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279

        SHA512

        1b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\msvcp140.dll

        Filesize

        427KB

        MD5

        71a0aa2d05e9174cefd568347bd9c70f

        SHA1

        cb9247a0fa59e47f72df7d1752424b33a903bbb2

        SHA256

        fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

        SHA512

        6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe

        Filesize

        938KB

        MD5

        b15bac961f62448c872e1dc6d3931016

        SHA1

        1dcb61babb08fe5db711e379cb67335357a5db82

        SHA256

        bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5

        SHA512

        932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\quersprung.vhd

        Filesize

        1.3MB

        MD5

        3bee67dd0e04559c8fdc7761336dee47

        SHA1

        027ef9dca01fb928db79e57b418130165f06ed5f

        SHA256

        57745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812

        SHA512

        35fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce

      • C:\Users\Admin\AppData\Local\Temp\u1h8.0.exe

        Filesize

        270KB

        MD5

        e04ed0504fa27e027f881d56374ad908

        SHA1

        91d403c72d54827fccd12fe28738db10c90f574e

        SHA256

        e96794b68e92761704f3b5178a35816a7d856b789a9d076984bb75486e3afa0d

        SHA512

        cbd4537b2103f302b20564583520f3ffc44cb56a8eb849e7db00ce93c868b1ff4449c86f01380f33028397b32e78d8f671b3676d70b66368d39c89c9efd867b0

      • C:\Users\Admin\AppData\Local\Temp\u1h8.1.exe

        Filesize

        4.6MB

        MD5

        397926927bca55be4a77839b1c44de6e

        SHA1

        e10f3434ef3021c399dbba047832f02b3c898dbd

        SHA256

        4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

        SHA512

        cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

      • memory/1344-180-0x000001CC71DE0000-0x000001CC71E92000-memory.dmp

        Filesize

        712KB

      • memory/1344-194-0x000001CC76390000-0x000001CC763C8000-memory.dmp

        Filesize

        224KB

      • memory/1344-211-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-210-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-209-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-208-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-207-0x00007FF970D20000-0x00007FF9717E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1344-205-0x000001CC723D0000-0x000001CC723EE000-memory.dmp

        Filesize

        120KB

      • memory/1344-204-0x000001CC723A0000-0x000001CC723C2000-memory.dmp

        Filesize

        136KB

      • memory/1344-201-0x000001CC772C0000-0x000001CC77310000-memory.dmp

        Filesize

        320KB

      • memory/1344-202-0x000001CC77270000-0x000001CC7727C000-memory.dmp

        Filesize

        48KB

      • memory/1344-203-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-198-0x000001CC77A50000-0x000001CC77F78000-memory.dmp

        Filesize

        5.2MB

      • memory/1344-197-0x000001CC77500000-0x000001CC77522000-memory.dmp

        Filesize

        136KB

      • memory/1344-196-0x000001CC774F0000-0x000001CC774FA000-memory.dmp

        Filesize

        40KB

      • memory/1344-195-0x000001CC76360000-0x000001CC7636E000-memory.dmp

        Filesize

        56KB

      • memory/1344-171-0x000001CC6BA20000-0x000001CC6F318000-memory.dmp

        Filesize

        57.0MB

      • memory/1344-172-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-173-0x000001CC71B60000-0x000001CC71C70000-memory.dmp

        Filesize

        1.1MB

      • memory/1344-170-0x00007FF970D20000-0x00007FF9717E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1344-193-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-192-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-174-0x000001CC70FF0000-0x000001CC71000000-memory.dmp

        Filesize

        64KB

      • memory/1344-190-0x000001CC71820000-0x000001CC71830000-memory.dmp

        Filesize

        64KB

      • memory/1344-191-0x000001CC76A50000-0x000001CC76A58000-memory.dmp

        Filesize

        32KB

      • memory/1344-188-0x000001CC72070000-0x000001CC72370000-memory.dmp

        Filesize

        3.0MB

      • memory/1344-184-0x000001CC71B20000-0x000001CC71B2A000-memory.dmp

        Filesize

        40KB

      • memory/1344-183-0x000001CC71FF0000-0x000001CC72066000-memory.dmp

        Filesize

        472KB

      • memory/1344-181-0x000001CC71E90000-0x000001CC71F0A000-memory.dmp

        Filesize

        488KB

      • memory/1344-182-0x000001CC71F10000-0x000001CC71F72000-memory.dmp

        Filesize

        392KB

      • memory/1344-179-0x000001CC71DB0000-0x000001CC71DDA000-memory.dmp

        Filesize

        168KB

      • memory/1344-178-0x000001CC71B10000-0x000001CC71B1A000-memory.dmp

        Filesize

        40KB

      • memory/1344-177-0x000001CC71AF0000-0x000001CC71B14000-memory.dmp

        Filesize

        144KB

      • memory/1344-176-0x000001CC71800000-0x000001CC71814000-memory.dmp

        Filesize

        80KB

      • memory/1344-175-0x000001CC71AA0000-0x000001CC71AAC000-memory.dmp

        Filesize

        48KB

      • memory/1512-93-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/1512-89-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/1512-88-0x00007FF991110000-0x00007FF991305000-memory.dmp

        Filesize

        2.0MB

      • memory/1512-87-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/1916-135-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/1916-1-0x0000000002EA0000-0x0000000002FA0000-memory.dmp

        Filesize

        1024KB

      • memory/1916-20-0x0000000002DD0000-0x0000000002E3E000-memory.dmp

        Filesize

        440KB

      • memory/1916-19-0x0000000002EA0000-0x0000000002FA0000-memory.dmp

        Filesize

        1024KB

      • memory/1916-17-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/1916-2-0x0000000002DD0000-0x0000000002E3E000-memory.dmp

        Filesize

        440KB

      • memory/1916-90-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/1916-3-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/2332-16-0x0000000000400000-0x0000000002C26000-memory.dmp

        Filesize

        40.1MB

      • memory/2332-15-0x0000000000400000-0x0000000002C26000-memory.dmp

        Filesize

        40.1MB

      • memory/2332-13-0x0000000002ED0000-0x0000000002FD0000-memory.dmp

        Filesize

        1024KB

      • memory/2332-14-0x0000000002E90000-0x0000000002EB7000-memory.dmp

        Filesize

        156KB

      • memory/3064-113-0x00000000055E0000-0x00000000055F0000-memory.dmp

        Filesize

        64KB

      • memory/3064-114-0x00000000057C0000-0x0000000005982000-memory.dmp

        Filesize

        1.8MB

      • memory/3064-110-0x0000000073750000-0x0000000073F00000-memory.dmp

        Filesize

        7.7MB

      • memory/3064-109-0x0000000000F00000-0x0000000000FC6000-memory.dmp

        Filesize

        792KB

      • memory/3064-112-0x0000000005AE0000-0x0000000006084000-memory.dmp

        Filesize

        5.6MB

      • memory/3064-104-0x0000000071C90000-0x0000000072EE4000-memory.dmp

        Filesize

        18.3MB

      • memory/3064-155-0x0000000073750000-0x0000000073F00000-memory.dmp

        Filesize

        7.7MB

      • memory/3064-156-0x00000000055E0000-0x00000000055F0000-memory.dmp

        Filesize

        64KB

      • memory/3064-111-0x0000000005490000-0x0000000005522000-memory.dmp

        Filesize

        584KB

      • memory/3064-116-0x0000000005670000-0x00000000056E6000-memory.dmp

        Filesize

        472KB

      • memory/3064-115-0x0000000005550000-0x00000000055A0000-memory.dmp

        Filesize

        320KB

      • memory/3092-68-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/3092-69-0x00007FF991110000-0x00007FF991305000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-101-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/4024-102-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/4024-105-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/4024-97-0x00007FF991110000-0x00007FF991305000-memory.dmp

        Filesize

        2.0MB

      • memory/4024-95-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/4312-130-0x00000000026A0000-0x00000000026A1000-memory.dmp

        Filesize

        4KB

      • memory/4312-169-0x0000000000400000-0x00000000008AD000-memory.dmp

        Filesize

        4.7MB

      • memory/4312-166-0x0000000000400000-0x00000000008AD000-memory.dmp

        Filesize

        4.7MB

      • memory/5092-34-0x0000000000400000-0x0000000000BEB000-memory.dmp

        Filesize

        7.9MB

      • memory/5092-55-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/5092-91-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/5092-44-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/5092-42-0x00007FF991110000-0x00007FF991305000-memory.dmp

        Filesize

        2.0MB

      • memory/5092-41-0x00000000730F0000-0x000000007326B000-memory.dmp

        Filesize

        1.5MB

      • memory/5092-92-0x0000000000400000-0x0000000000BEB000-memory.dmp

        Filesize

        7.9MB

      • memory/5092-35-0x00000000043A0000-0x00000000043A1000-memory.dmp

        Filesize

        4KB