Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 22:28

General

  • Target

    d83f04d14b3ef5742e3a5cb0c9089dea.exe

  • Size

    145KB

  • MD5

    d83f04d14b3ef5742e3a5cb0c9089dea

  • SHA1

    5ba0a13d620b4e2352de8cd4b033c3b4b4a85015

  • SHA256

    70c0d722f4eb2c9cd96a58ef04285323a897c7c28896654d4b1753e240079ad0

  • SHA512

    0840f4acaf1b98b5358ad0f0b51696cf8298f2f7112401ae79a39de3b02d801403914bc21f1704b9bc3df390d0886859534d9b02385b360b598f745d18ab304b

  • SSDEEP

    3072:8XZGjXpoGoByXPQs2UTXQ8yb7aFcCiSIvF68XJZ:mZGbpYByPT7lyvIcLSIvF68X

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d83f04d14b3ef5742e3a5cb0c9089dea.exe
    "C:\Users\Admin\AppData\Local\Temp\d83f04d14b3ef5742e3a5cb0c9089dea.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2240
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5D81E1FC-A5B1-4363-89F9-49E80BE77005} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQQB1AGQAaQB0AEYAbABhAGcAcwAuAGUAeABlADsA
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2040
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQQB1AGQAaQB0AEYAbABhAGcAcwAuAGUAeABlADsA
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:7032
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {77651E62-AC43-49BC-9029-90528A2B5FC6} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Local\ActivityId\xyjrphfd\AuditFlags.exe
      C:\Users\Admin\AppData\Local\ActivityId\xyjrphfd\AuditFlags.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:7768

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8ee36494e9ff17b35872c0fbc8ff5e3f

    SHA1

    95f2b9b7226df89f1f35ed3ff98fe0d973a943b6

    SHA256

    a24cad1ef08ad0a5f944245a946b891ada79800a1bab3cb7172354e079f78ac1

    SHA512

    220c0657dae404d67bf841ef4a369afb9eafab9f3152756865c4c28b9523741b56de09b02ab26b570ec0274b88f2e9ad1fa9efc8a8d6d57277ca7cb2d5f87032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7891a86bb1601357c72d71d487045c12

    SHA1

    22772343e409904b30a67b8a84f2625dfff066fa

    SHA256

    25463aeeabe9c204c154f899e6fa7301744e69dcb20ae45cc7721034e6d36dc8

    SHA512

    a7ec8718ce1cd607197e201e7498a435a74bc9d3c36d0ef1a1c251d5d967e33aff9e2c6e397b030d83e0fb29dcd983e2dd950596b0cf9f48e0ed5186207dfd4a

  • C:\Users\Admin\AppData\Local\ActivityId\xyjrphfd\AuditFlags.exe
    Filesize

    145KB

    MD5

    d83f04d14b3ef5742e3a5cb0c9089dea

    SHA1

    5ba0a13d620b4e2352de8cd4b033c3b4b4a85015

    SHA256

    70c0d722f4eb2c9cd96a58ef04285323a897c7c28896654d4b1753e240079ad0

    SHA512

    0840f4acaf1b98b5358ad0f0b51696cf8298f2f7112401ae79a39de3b02d801403914bc21f1704b9bc3df390d0886859534d9b02385b360b598f745d18ab304b

  • C:\Users\Admin\AppData\Local\Temp\Cab1D04.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1DE6.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    0bfb4bd6640707edc1e6f158fa035f86

    SHA1

    4ff98185673332bbb79b99210cafa875fb90e7be

    SHA256

    225eb85c8d86a5205d09a15c98b3015019e0eafd275aca5e87f01374fd0f133e

    SHA512

    9e0605d48fefaca89cba5e2ea12cb73744bc4d6d531da48e10fbe968b017b4928d2d34235b70e815ca3d16580f8ac1feeb12b292d78d354212762c4155268754

  • memory/1240-7191-0x0000000000D70000-0x0000000000D98000-memory.dmp
    Filesize

    160KB

  • memory/2040-7187-0x000000001A140000-0x000000001A422000-memory.dmp
    Filesize

    2.9MB

  • memory/2040-7188-0x0000000001250000-0x0000000001258000-memory.dmp
    Filesize

    32KB

  • memory/2240-110-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-100-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-82-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-84-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-94-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-138-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-142-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-144-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-140-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-136-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-134-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-132-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-130-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-128-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-126-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-124-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-122-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-120-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-118-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-116-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-114-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-112-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-90-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-108-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-106-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-104-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-102-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-81-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-98-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-96-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-92-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-88-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-4961-0x0000000004070000-0x0000000004071000-memory.dmp
    Filesize

    4KB

  • memory/2240-4963-0x0000000004BE0000-0x0000000004C2C000-memory.dmp
    Filesize

    304KB

  • memory/2240-4962-0x0000000007EF0000-0x0000000007FF2000-memory.dmp
    Filesize

    1.0MB

  • memory/2240-4964-0x0000000077150000-0x0000000077226000-memory.dmp
    Filesize

    856KB

  • memory/2240-4965-0x0000000005430000-0x0000000005484000-memory.dmp
    Filesize

    336KB

  • memory/2240-4968-0x00000000084E0000-0x000000000858C000-memory.dmp
    Filesize

    688KB

  • memory/2240-4971-0x0000000004C30000-0x0000000004C70000-memory.dmp
    Filesize

    256KB

  • memory/2240-4970-0x0000000004C30000-0x0000000004C70000-memory.dmp
    Filesize

    256KB

  • memory/2240-4969-0x0000000004C30000-0x0000000004C70000-memory.dmp
    Filesize

    256KB

  • memory/2240-4972-0x0000000008A80000-0x0000000008B68000-memory.dmp
    Filesize

    928KB

  • memory/2240-7178-0x0000000005940000-0x0000000005996000-memory.dmp
    Filesize

    344KB

  • memory/2240-7177-0x0000000005700000-0x0000000005708000-memory.dmp
    Filesize

    32KB

  • memory/2240-86-0x0000000007C20000-0x0000000007EE1000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-80-0x0000000007C20000-0x0000000007EE6000-memory.dmp
    Filesize

    2.8MB

  • memory/2240-2-0x0000000004C30000-0x0000000004C70000-memory.dmp
    Filesize

    256KB

  • memory/2240-7181-0x0000000074160000-0x000000007484E000-memory.dmp
    Filesize

    6.9MB

  • memory/2240-7182-0x0000000077150000-0x0000000077226000-memory.dmp
    Filesize

    856KB

  • memory/2240-0-0x00000000008C0000-0x00000000008E8000-memory.dmp
    Filesize

    160KB

  • memory/2240-1-0x0000000074160000-0x000000007484E000-memory.dmp
    Filesize

    6.9MB

  • memory/7032-21418-0x000000001A2C0000-0x000000001A5A2000-memory.dmp
    Filesize

    2.9MB

  • memory/7032-21419-0x00000000009E0000-0x00000000009E8000-memory.dmp
    Filesize

    32KB

  • memory/7768-14309-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB