Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 16:11

General

  • Target

    c80440f04b9658f97cddb36ef129ecc147af57f21eb96adedffc107962792683.exe

  • Size

    415KB

  • MD5

    e56d256de9665d5242fdf92017fb655a

  • SHA1

    34e6d35fb1b097eec7067ba761b13770d1c893a1

  • SHA256

    c80440f04b9658f97cddb36ef129ecc147af57f21eb96adedffc107962792683

  • SHA512

    aad2e8d77c71337268d6286e1a1cd077c0a0e50df139a5085a2b3ee156153516fa4035d4e4e50ae17ecdfb68dd57b6863363e77ab683e3ee49e9b16597ceef12

  • SSDEEP

    6144:/aN1HIT5R7GDqn3D8mHUwsYPxLF7wBPJlGKVLf0ZFvS6HBiJ/F:/aN1HIz7GDC/HLsOMh5pqFvS2iF

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c80440f04b9658f97cddb36ef129ecc147af57f21eb96adedffc107962792683.exe
    "C:\Users\Admin\AppData\Local\Temp\c80440f04b9658f97cddb36ef129ecc147af57f21eb96adedffc107962792683.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Users\Admin\AppData\Local\Temp\u2i8.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u2i8.0.exe"
      2⤵
      • Executes dropped EXE
      PID:3644
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 1048
        3⤵
        • Program crash
        PID:4436
    • C:\Users\Admin\AppData\Local\Temp\u2i8.1.exe
      "C:\Users\Admin\AppData\Local\Temp\u2i8.1.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
        "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4340
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 1012
      2⤵
      • Program crash
      PID:4328
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3644 -ip 3644
    1⤵
      PID:1332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3248 -ip 3248
      1⤵
        PID:3668

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\u2i8.0.exe

              Filesize

              270KB

              MD5

              c1a2a59a440c4f66eca66d293d69b68a

              SHA1

              660f7f669f7d8cb80e6c8819c617c1114e4a6501

              SHA256

              8c3a94acedead79eda9602c2547bc37ed0551104eb988f95b035bf17a78ae5e2

              SHA512

              f5df207a59c1f85511a33600cf3a8e5417d0589e53e6f6ea952b2646f2e5f0d8aaed2842be6ecac8a90c2fa09c6805766754a222ec5acda8b196bee4a0da1f2c

            • C:\Users\Admin\AppData\Local\Temp\u2i8.1.exe

              Filesize

              4.6MB

              MD5

              397926927bca55be4a77839b1c44de6e

              SHA1

              e10f3434ef3021c399dbba047832f02b3c898dbd

              SHA256

              4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

              SHA512

              cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

            • memory/1692-66-0x0000000000400000-0x00000000008AD000-memory.dmp

              Filesize

              4.7MB

            • memory/1692-54-0x0000000000400000-0x00000000008AD000-memory.dmp

              Filesize

              4.7MB

            • memory/1692-28-0x00000000026A0000-0x00000000026A1000-memory.dmp

              Filesize

              4KB

            • memory/3248-33-0x0000000000400000-0x0000000002C4A000-memory.dmp

              Filesize

              40.3MB

            • memory/3248-17-0x0000000000400000-0x0000000002C4A000-memory.dmp

              Filesize

              40.3MB

            • memory/3248-3-0x0000000000400000-0x0000000002C4A000-memory.dmp

              Filesize

              40.3MB

            • memory/3248-34-0x0000000003140000-0x00000000031AE000-memory.dmp

              Filesize

              440KB

            • memory/3248-2-0x0000000003140000-0x00000000031AE000-memory.dmp

              Filesize

              440KB

            • memory/3248-1-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

              Filesize

              1024KB

            • memory/3644-15-0x0000000000400000-0x0000000002C26000-memory.dmp

              Filesize

              40.1MB

            • memory/3644-16-0x0000000000400000-0x0000000002C26000-memory.dmp

              Filesize

              40.1MB

            • memory/3644-13-0x0000000002ED0000-0x0000000002FD0000-memory.dmp

              Filesize

              1024KB

            • memory/3644-14-0x0000000002D80000-0x0000000002DA7000-memory.dmp

              Filesize

              156KB

            • memory/4340-76-0x000002B7FCF30000-0x000002B7FCFE2000-memory.dmp

              Filesize

              712KB

            • memory/4340-88-0x000002B7FF480000-0x000002B7FF488000-memory.dmp

              Filesize

              32KB

            • memory/4340-69-0x000002B7FCAB0000-0x000002B7FCAC0000-memory.dmp

              Filesize

              64KB

            • memory/4340-70-0x000002B7FCCE0000-0x000002B7FCDF0000-memory.dmp

              Filesize

              1.1MB

            • memory/4340-71-0x000002B7FCAA0000-0x000002B7FCAB0000-memory.dmp

              Filesize

              64KB

            • memory/4340-72-0x000002B7FCAD0000-0x000002B7FCADC000-memory.dmp

              Filesize

              48KB

            • memory/4340-73-0x000002B7FCAC0000-0x000002B7FCAD4000-memory.dmp

              Filesize

              80KB

            • memory/4340-74-0x000002B7FCB30000-0x000002B7FCB54000-memory.dmp

              Filesize

              144KB

            • memory/4340-75-0x000002B7FC140000-0x000002B7FC14A000-memory.dmp

              Filesize

              40KB

            • memory/4340-67-0x00007FFB59920000-0x00007FFB5A3E1000-memory.dmp

              Filesize

              10.8MB

            • memory/4340-77-0x000002B7FCFE0000-0x000002B7FD00A000-memory.dmp

              Filesize

              168KB

            • memory/4340-78-0x000002B7FD010000-0x000002B7FD08A000-memory.dmp

              Filesize

              488KB

            • memory/4340-79-0x000002B7FD090000-0x000002B7FD0F2000-memory.dmp

              Filesize

              392KB

            • memory/4340-80-0x000002B7FD170000-0x000002B7FD1E6000-memory.dmp

              Filesize

              472KB

            • memory/4340-81-0x000002B7FC150000-0x000002B7FC15A000-memory.dmp

              Filesize

              40KB

            • memory/4340-85-0x000002B7FD1F0000-0x000002B7FD4F0000-memory.dmp

              Filesize

              3.0MB

            • memory/4340-87-0x000002B7FCAB0000-0x000002B7FCAC0000-memory.dmp

              Filesize

              64KB

            • memory/4340-68-0x000002B7F6B80000-0x000002B7FA478000-memory.dmp

              Filesize

              57.0MB

            • memory/4340-89-0x000002B7FCAB0000-0x000002B7FCAC0000-memory.dmp

              Filesize

              64KB

            • memory/4340-90-0x000002B7FF4D0000-0x000002B7FF508000-memory.dmp

              Filesize

              224KB

            • memory/4340-91-0x000002B7FF490000-0x000002B7FF49E000-memory.dmp

              Filesize

              56KB

            • memory/4340-92-0x000002B79AAF0000-0x000002B79AAFA000-memory.dmp

              Filesize

              40KB

            • memory/4340-93-0x000002B79AB20000-0x000002B79AB42000-memory.dmp

              Filesize

              136KB

            • memory/4340-94-0x000002B79B070000-0x000002B79B598000-memory.dmp

              Filesize

              5.2MB

            • memory/4340-97-0x000002B7FF970000-0x000002B7FF9C0000-memory.dmp

              Filesize

              320KB

            • memory/4340-98-0x000002B79AB00000-0x000002B79AB0C000-memory.dmp

              Filesize

              48KB

            • memory/4340-99-0x000002B7FF510000-0x000002B7FF532000-memory.dmp

              Filesize

              136KB

            • memory/4340-100-0x000002B7FF540000-0x000002B7FF55E000-memory.dmp

              Filesize

              120KB

            • memory/4340-102-0x00007FFB59920000-0x00007FFB5A3E1000-memory.dmp

              Filesize

              10.8MB

            • memory/4340-103-0x000002B7FCAB0000-0x000002B7FCAC0000-memory.dmp

              Filesize

              64KB

            • memory/4340-104-0x000002B7FCAB0000-0x000002B7FCAC0000-memory.dmp

              Filesize

              64KB

            • memory/4340-105-0x000002B7FCAB0000-0x000002B7FCAC0000-memory.dmp

              Filesize

              64KB

            • memory/4340-106-0x000002B7FCAB0000-0x000002B7FCAC0000-memory.dmp

              Filesize

              64KB