Analysis
-
max time kernel
364s -
max time network
875s -
platform
windows10-1703_x64 -
resource
win10-20240404-fr -
resource tags
arch:x64arch:x86image:win10-20240404-frlocale:fr-fros:windows10-1703-x64systemwindows -
submitted
28-04-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
GTA 6 Builder-Install.rar
Resource
win10-20240404-fr
Behavioral task
behavioral2
Sample
GTA 6 Builder-Install.exe
Resource
win10-20240404-fr
Behavioral task
behavioral3
Sample
NL7Data0404.dll
Resource
win10-20240404-fr
Behavioral task
behavioral4
Sample
NL7Models0804.dll
Resource
win10-20240404-fr
Behavioral task
behavioral5
Sample
NlsData004a.dll
Resource
win10-20240404-fr
Behavioral task
behavioral6
Sample
README.txt
Resource
win10-20240404-fr
General
-
Target
GTA 6 Builder-Install.exe
-
Size
13.1MB
-
MD5
95f7a7d1658b372cbcbd6cc1ef91bef9
-
SHA1
180182eef4ac2baaa0d773aeb59aec022a3d34cc
-
SHA256
841d63d65e18b16579ff539e49ea437ef27c488d52d463b0105cdd4b19d2ea37
-
SHA512
26bc67b7665bb2423e765249caf7ab7a0634af699335568d5b19732a149560d9b77bc586477c12bacc66cf382a1e80b9846e6fe05d9e9315e66f88e438d4c095
-
SSDEEP
196608:Ya4hESrp12vabgVvjce8pPZHjSOZlrMUjJi2QSdI/K2RZPvn3J+sL378BZnybgbo:Ya+HoRHe5V/rDjJfNqvZXn3J+DZyBd
Malware Config
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\ms_updater.exe family_zgrat_v1 behavioral2/memory/4852-17-0x00000000002B0000-0x00000000004B6000-memory.dmp family_zgrat_v1 behavioral2/memory/3516-19-0x0000000001010000-0x000000000256A000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
Processes:
ms_tool.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe ms_tool.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe ms_tool.exe -
Executes dropped EXE 2 IoCs
Processes:
ms_tool.exems_updater.exepid process 312 ms_tool.exe 4852 ms_updater.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
ms_updater.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings ms_updater.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
GTA 6 Builder-Install.exems_updater.exepid process 3516 GTA 6 Builder-Install.exe 3516 GTA 6 Builder-Install.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe 4852 ms_updater.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ms_updater.exedescription pid process Token: SeDebugPrivilege 4852 ms_updater.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
GTA 6 Builder-Install.exems_updater.execmd.exedescription pid process target process PID 3516 wrote to memory of 312 3516 GTA 6 Builder-Install.exe ms_tool.exe PID 3516 wrote to memory of 312 3516 GTA 6 Builder-Install.exe ms_tool.exe PID 3516 wrote to memory of 4852 3516 GTA 6 Builder-Install.exe ms_updater.exe PID 3516 wrote to memory of 4852 3516 GTA 6 Builder-Install.exe ms_updater.exe PID 4852 wrote to memory of 4976 4852 ms_updater.exe cmd.exe PID 4852 wrote to memory of 4976 4852 ms_updater.exe cmd.exe PID 4976 wrote to memory of 1056 4976 cmd.exe chcp.com PID 4976 wrote to memory of 1056 4976 cmd.exe chcp.com PID 4976 wrote to memory of 4664 4976 cmd.exe PING.EXE PID 4976 wrote to memory of 4664 4976 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\GTA 6 Builder-Install.exe"C:\Users\Admin\AppData\Local\Temp\GTA 6 Builder-Install.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\ms_tool.exe"C:\Users\Admin\AppData\Roaming\ms_tool.exe"2⤵
- Drops startup file
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\ms_updater.exe"C:\Users\Admin\AppData\Roaming\ms_updater.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cV1vwDPsky.bat"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650014⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cV1vwDPsky.batFilesize
177B
MD58611dc4d28dab0485024fdddd11bd17e
SHA1df05fcb1e755420cdb7ff926b870afed35e5de6e
SHA2568c4a03420f585bc07971c18f9169960ae12f72c7a23ab1f9c4dba59be23f4664
SHA512b8c2023f36e6855719f83f0a4b614e697c53ea52350992f4bb77a7b9ae8ba9c18561864025f7ff54c166fdfd93d851cdcb350cd42fe601aeb3816ccbf7f38f39
-
C:\Users\Admin\AppData\Roaming\ms_tool.exeFilesize
11KB
MD5f8701952b62a7e52652271a20b824128
SHA182292b1cd54afa277116b42f4b1c43c8933478f0
SHA2565b0b886143ffe9f5c5750c9b171656783668b655e559ea95d002a265586e3413
SHA5125acde46db767cf11ea5183007542fd67e1512ccfbcc37efdec685e2db369840a767981b0996dbace0f40602ada0a5c0aed39019ce06590151cd59f0dfa5d68e5
-
C:\Users\Admin\AppData\Roaming\ms_updater.exeFilesize
2.0MB
MD531e5e3ac5a03d60d67188b6b0c3d152b
SHA141e831bc8b0c314a46d17492ded7b6b587d66db2
SHA256dc73ce51066fdcd5f0c7c88fd6fdfb9a4a3722ebe3d2def1dc593fbc1af9e467
SHA51264837c66af3f63c214ff8f466266f3dea1cf135d54ccaaf5c06fa13763045d79220f88d09ca49a36668d7e1f506bc74c9a2b8de0ec77aac272b0e1466aa168c2
-
memory/312-12-0x000002BE8D580000-0x000002BE8D588000-memory.dmpFilesize
32KB
-
memory/312-18-0x00007FFE93AF0000-0x00007FFE944DC000-memory.dmpFilesize
9.9MB
-
memory/312-40-0x00007FFE93AF0000-0x00007FFE944DC000-memory.dmpFilesize
9.9MB
-
memory/3516-0-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/3516-4-0x0000000001010000-0x000000000256A000-memory.dmpFilesize
21.4MB
-
memory/3516-1-0x0000000001010000-0x000000000256A000-memory.dmpFilesize
21.4MB
-
memory/3516-19-0x0000000001010000-0x000000000256A000-memory.dmpFilesize
21.4MB
-
memory/4852-22-0x000000001B130000-0x000000001B180000-memory.dmpFilesize
320KB
-
memory/4852-24-0x00000000026F0000-0x0000000002708000-memory.dmpFilesize
96KB
-
memory/4852-26-0x0000000002570000-0x000000000257E000-memory.dmpFilesize
56KB
-
memory/4852-28-0x0000000002710000-0x000000000271E000-memory.dmpFilesize
56KB
-
memory/4852-30-0x000000001B180000-0x000000001B192000-memory.dmpFilesize
72KB
-
memory/4852-32-0x0000000002720000-0x000000000272C000-memory.dmpFilesize
48KB
-
memory/4852-34-0x0000000002730000-0x000000000273E000-memory.dmpFilesize
56KB
-
memory/4852-36-0x0000000002740000-0x000000000274C000-memory.dmpFilesize
48KB
-
memory/4852-37-0x000000001B6D0000-0x000000001B7D2000-memory.dmpFilesize
1.0MB
-
memory/4852-38-0x000000001B7E0000-0x000000001B87E000-memory.dmpFilesize
632KB
-
memory/4852-21-0x0000000002580000-0x000000000259C000-memory.dmpFilesize
112KB
-
memory/4852-71-0x000000001B7E0000-0x000000001B87E000-memory.dmpFilesize
632KB
-
memory/4852-17-0x00000000002B0000-0x00000000004B6000-memory.dmpFilesize
2.0MB