Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 01:32

General

  • Target

    70c0d722f4eb2c9cd96a58ef04285323a897c7c28896654d4b1753e240079ad0.exe

  • Size

    145KB

  • MD5

    d83f04d14b3ef5742e3a5cb0c9089dea

  • SHA1

    5ba0a13d620b4e2352de8cd4b033c3b4b4a85015

  • SHA256

    70c0d722f4eb2c9cd96a58ef04285323a897c7c28896654d4b1753e240079ad0

  • SHA512

    0840f4acaf1b98b5358ad0f0b51696cf8298f2f7112401ae79a39de3b02d801403914bc21f1704b9bc3df390d0886859534d9b02385b360b598f745d18ab304b

  • SSDEEP

    3072:8XZGjXpoGoByXPQs2UTXQ8yb7aFcCiSIvF68XJZ:mZGbpYByPT7lyvIcLSIvF68X

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70c0d722f4eb2c9cd96a58ef04285323a897c7c28896654d4b1753e240079ad0.exe
    "C:\Users\Admin\AppData\Local\Temp\70c0d722f4eb2c9cd96a58ef04285323a897c7c28896654d4b1753e240079ad0.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1252
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {1292622B-BC80-4F28-AF1D-73BE1D2DE102} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:7664
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQQB1AGQAaQB0AEYAbABhAGcAcwAuAGUAeABlADsA
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:7696
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQQB1AGQAaQB0AEYAbABhAGcAcwAuAGUAeABlADsA
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:7056
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {BDE20C3C-F621-426F-8F37-F3E99139EAE3} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:7868
    • C:\Users\Admin\AppData\Local\ActivityId\ckvih\AuditFlags.exe
      C:\Users\Admin\AppData\Local\ActivityId\ckvih\AuditFlags.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:7900
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d565b15d3067cd3290ce2fddfc9147b

    SHA1

    e0db5281b44fd9e04bf8fc1db0829eec4b21eb2c

    SHA256

    23c96a3459db22da6ab0c65b7805eaff8bc39a0fad98b366157ee506d0341bbf

    SHA512

    a22db46f75f3c46c1b47a9c8b24f4b6a1b68aabb3737aae9bcffc9efc2e7b20d97bbfd4cc4f58cb1a157b08a8cb68eed8fbafd05137159e1806d3b24eac1907d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d42922a4d5383af24cec3cb16ddce2f8

    SHA1

    1c49e4a4b01d2485fab92ea6e85bb14bbd4b3934

    SHA256

    0f0c1fffe2ea6cfb07e2043ea9ea1ee7f12f6d720a12d9426c029c243f737fb4

    SHA512

    ee78b8acbc03dbeca7981efecbb95c4b270a10c5e1650237cf48f798def672c59c770a69970e156d363382e5983337a151c7b134719405b17953f79e3ebaa8ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca9bf1e39fc4bc2f02e96c307f5a5894

    SHA1

    9f62a2612af068fe522e6dff4c36cb86c94dd404

    SHA256

    4f1f14b5142f2eb62d053673b78e24273dc807caf74cf4b49b3440bde8f52dda

    SHA512

    13c3c1a79be85ac82d13d73b44301f34b39ccec982a1ac844434be2429a01c7c7523bb406f7bfdcd15869674fc9fd358a0a60d5ddf57c29d7b7f3d740c867591

  • C:\Users\Admin\AppData\Local\ActivityId\ckvih\AuditFlags.exe

    Filesize

    145KB

    MD5

    d83f04d14b3ef5742e3a5cb0c9089dea

    SHA1

    5ba0a13d620b4e2352de8cd4b033c3b4b4a85015

    SHA256

    70c0d722f4eb2c9cd96a58ef04285323a897c7c28896654d4b1753e240079ad0

    SHA512

    0840f4acaf1b98b5358ad0f0b51696cf8298f2f7112401ae79a39de3b02d801403914bc21f1704b9bc3df390d0886859534d9b02385b360b598f745d18ab304b

  • C:\Users\Admin\AppData\Local\Temp\Cab8567.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8723.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    154e825aae4c8c235add8786292d988e

    SHA1

    a87c7872ecd2277d529f54e21873b64448cf149e

    SHA256

    c0c098c399420f7fd33f2c59ab9bb2d17f57e202aa164b613cf5294e262af2bd

    SHA512

    d1f5d1521284dc542d2792909f1f170fe257ae67bb578081e9394c39bf309c376ad970d5b900399efd32b30298290d769b142ee87e9d3de5fe3053d69dc846a5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DWO16PSEBR2SLQW326XT.temp

    Filesize

    7KB

    MD5

    6767f6869da5a568e326a6f1f6bf4b5a

    SHA1

    077febe9cb28219ef7836d84645321215083cbdb

    SHA256

    8124d23c4b2c2aad88a6d4a911c4e0747edc9ac466acb2c19872da132448a8cb

    SHA512

    988dbdb130174961119cbd6c90e346ca6de2de622cb006402fb4ce1a78d6dce1167c2cc9b5ac54e5dc09f3ab0f01a5c9593c33e5aa6bd396ffa5532de020f670

  • memory/1032-21412-0x00000000075E0000-0x0000000007634000-memory.dmp

    Filesize

    336KB

  • memory/1032-14301-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1252-111-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-4950-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1252-77-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-79-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-81-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-83-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-85-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-87-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-93-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-99-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-101-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-89-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-113-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-115-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-117-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-119-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-125-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-91-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-95-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-97-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-105-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-103-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-107-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-75-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-109-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-133-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-131-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-129-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-127-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-73-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-123-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-121-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-4952-0x0000000004D90000-0x0000000004DDC000-memory.dmp

    Filesize

    304KB

  • memory/1252-4951-0x0000000006790000-0x0000000006892000-memory.dmp

    Filesize

    1.0MB

  • memory/1252-4953-0x00000000776B0000-0x0000000077786000-memory.dmp

    Filesize

    856KB

  • memory/1252-4954-0x0000000004FB0000-0x0000000005004000-memory.dmp

    Filesize

    336KB

  • memory/1252-4959-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1252-4961-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1252-4960-0x00000000745C0000-0x0000000074CAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1252-4958-0x0000000006F50000-0x0000000006FFC000-memory.dmp

    Filesize

    688KB

  • memory/1252-4957-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1252-4962-0x0000000006300000-0x00000000063E8000-memory.dmp

    Filesize

    928KB

  • memory/1252-7167-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1252-7168-0x00000000050A0000-0x00000000050A8000-memory.dmp

    Filesize

    32KB

  • memory/1252-7169-0x00000000052A0000-0x00000000052F6000-memory.dmp

    Filesize

    344KB

  • memory/1252-7170-0x0000000005690000-0x00000000056E4000-memory.dmp

    Filesize

    336KB

  • memory/1252-7173-0x00000000745C0000-0x0000000074CAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1252-7174-0x00000000776B0000-0x0000000077786000-memory.dmp

    Filesize

    856KB

  • memory/1252-0-0x0000000000C60000-0x0000000000C88000-memory.dmp

    Filesize

    160KB

  • memory/1252-1-0x00000000745C0000-0x0000000074CAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1252-2-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/1252-72-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-70-0x00000000079D0000-0x0000000007C91000-memory.dmp

    Filesize

    2.8MB

  • memory/1252-69-0x00000000079D0000-0x0000000007C96000-memory.dmp

    Filesize

    2.8MB

  • memory/7056-21410-0x0000000019EC0000-0x000000001A1A2000-memory.dmp

    Filesize

    2.9MB

  • memory/7056-21411-0x0000000000E80000-0x0000000000E88000-memory.dmp

    Filesize

    32KB

  • memory/7696-7180-0x0000000000F80000-0x0000000000F88000-memory.dmp

    Filesize

    32KB

  • memory/7696-7179-0x0000000019CE0000-0x0000000019FC2000-memory.dmp

    Filesize

    2.9MB

  • memory/7900-7183-0x0000000000CE0000-0x0000000000D08000-memory.dmp

    Filesize

    160KB