Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 05:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
noncryptedmainstub.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
noncryptedmainstub.exe
-
Size
632KB
-
MD5
9eab8c5d7b1f4659a787cc77d571f03b
-
SHA1
27ce5d456d44b2d0ce994b14b11e8c5ffeabf385
-
SHA256
1254ede011ea7c8ba1658bab1c14877d1a2dc85f8b4e2d04be6c5fc65f1c32b8
-
SHA512
1fcfa030dac1c6fb573c614c1564e663086b518fa376ce3bbf90da6b1ecc8d065f91c90d6f6efea23c27efce720b90847869d0eef84ce4939fb1f43d7d0eafd9
-
SSDEEP
12288:waOcj6gjLcJD/VF3AlAp2jLre/i6g578+3NruqK1lMdMD6QVCh5Iy5C:wuHj4JzQlq2j2/iJ78KNzK1lMCGGCR
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2392-3-0x000000001B7C0000-0x000000001B8C2000-memory.dmp family_zgrat_v1 -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
noncryptedmainstub.exepid process 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe 2392 noncryptedmainstub.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
noncryptedmainstub.exedescription pid process Token: SeDebugPrivilege 2392 noncryptedmainstub.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2392-0-0x000000013FDF0000-0x000000013FE92000-memory.dmpFilesize
648KB
-
memory/2392-1-0x000007FEF5530000-0x000007FEF5F1C000-memory.dmpFilesize
9.9MB
-
memory/2392-2-0x000000001B990000-0x000000001BA10000-memory.dmpFilesize
512KB
-
memory/2392-3-0x000000001B7C0000-0x000000001B8C2000-memory.dmpFilesize
1.0MB
-
memory/2392-4-0x000000001B220000-0x000000001B276000-memory.dmpFilesize
344KB
-
memory/2392-5-0x00000000020C0000-0x000000000210C000-memory.dmpFilesize
304KB
-
memory/2392-6-0x000000001B990000-0x000000001BA10000-memory.dmpFilesize
512KB
-
memory/2392-7-0x000000001B990000-0x000000001BA10000-memory.dmpFilesize
512KB
-
memory/2392-8-0x000000001B990000-0x000000001BA10000-memory.dmpFilesize
512KB
-
memory/2392-9-0x000007FEF5530000-0x000007FEF5F1C000-memory.dmpFilesize
9.9MB
-
memory/2392-10-0x000000001B990000-0x000000001BA10000-memory.dmpFilesize
512KB
-
memory/2392-11-0x000000001B990000-0x000000001BA10000-memory.dmpFilesize
512KB
-
memory/2392-12-0x000000001B990000-0x000000001BA10000-memory.dmpFilesize
512KB
-
memory/2392-13-0x000000001B990000-0x000000001BA10000-memory.dmpFilesize
512KB