Analysis
-
max time kernel
135s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe
Resource
win7-20240221-en
General
-
Target
be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe
-
Size
474KB
-
MD5
ec3e0e37a0706e727186ef4a1d338b48
-
SHA1
549d90919104da57c9ed2e6cbc3d4a654b32162b
-
SHA256
be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5
-
SHA512
6010946af214b0015b899f1fb1086a66a0e5d0851a35256f3294ea92e3557912cd129569220c69a4f593db37ad9027c3c7c297f904965ea9cc2e8af61a7a0862
-
SSDEEP
6144:hxxxVzbfkDOMpkMQ2S/YUa/fdchxRhu9X:hxxYtB8//acRuX
Malware Config
Signatures
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/3900-16-0x0000000004EA0000-0x0000000004F7C000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-18-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-17-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-20-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-22-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-26-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-28-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-34-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-40-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-48-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-62-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-76-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-78-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-74-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-72-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-70-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-68-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-66-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-64-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-60-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-58-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-56-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-54-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-52-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-50-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-46-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-44-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-42-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-38-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-36-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-32-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-30-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 behavioral2/memory/3900-24-0x0000000004EA0000-0x0000000004F76000-memory.dmp family_zgrat_v1 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1696 set thread context of 3900 1696 WindowsLibrary.exe 97 PID 3876 set thread context of 1108 3876 WindowsLibrary.exe 103 -
Executes dropped EXE 3 IoCs
pid Process 1696 WindowsLibrary.exe 3876 WindowsLibrary.exe 4124 WindowsLibrary.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1076 SCHtAsKs.EXe 2068 SCHtAsKs.EXe 2848 SCHtAsKs.EXe 4736 SCHtAsKs.EXe 1388 SCHtAsKs.EXe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 1696 WindowsLibrary.exe 1696 WindowsLibrary.exe 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 3876 WindowsLibrary.exe 3876 WindowsLibrary.exe 4124 WindowsLibrary.exe 4124 WindowsLibrary.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe Token: SeDebugPrivilege 1696 WindowsLibrary.exe Token: SeDebugPrivilege 3900 RegAsm.exe Token: SeDebugPrivilege 3876 WindowsLibrary.exe Token: SeDebugPrivilege 1108 RegAsm.exe Token: SeDebugPrivilege 4124 WindowsLibrary.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 556 wrote to memory of 1076 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 82 PID 556 wrote to memory of 1076 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 82 PID 556 wrote to memory of 2068 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 84 PID 556 wrote to memory of 2068 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 84 PID 1696 wrote to memory of 2848 1696 WindowsLibrary.exe 91 PID 1696 wrote to memory of 2848 1696 WindowsLibrary.exe 91 PID 556 wrote to memory of 1120 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 96 PID 556 wrote to memory of 1120 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 96 PID 556 wrote to memory of 1120 556 be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe 96 PID 1696 wrote to memory of 3900 1696 WindowsLibrary.exe 97 PID 1696 wrote to memory of 3900 1696 WindowsLibrary.exe 97 PID 1696 wrote to memory of 3900 1696 WindowsLibrary.exe 97 PID 1696 wrote to memory of 3900 1696 WindowsLibrary.exe 97 PID 1696 wrote to memory of 3900 1696 WindowsLibrary.exe 97 PID 1696 wrote to memory of 3900 1696 WindowsLibrary.exe 97 PID 1696 wrote to memory of 3900 1696 WindowsLibrary.exe 97 PID 1696 wrote to memory of 3900 1696 WindowsLibrary.exe 97 PID 3876 wrote to memory of 4736 3876 WindowsLibrary.exe 100 PID 3876 wrote to memory of 4736 3876 WindowsLibrary.exe 100 PID 3876 wrote to memory of 1108 3876 WindowsLibrary.exe 103 PID 3876 wrote to memory of 1108 3876 WindowsLibrary.exe 103 PID 3876 wrote to memory of 1108 3876 WindowsLibrary.exe 103 PID 3876 wrote to memory of 1108 3876 WindowsLibrary.exe 103 PID 3876 wrote to memory of 1108 3876 WindowsLibrary.exe 103 PID 3876 wrote to memory of 1108 3876 WindowsLibrary.exe 103 PID 3876 wrote to memory of 1108 3876 WindowsLibrary.exe 103 PID 3876 wrote to memory of 1108 3876 WindowsLibrary.exe 103 PID 4124 wrote to memory of 1388 4124 WindowsLibrary.exe 105 PID 4124 wrote to memory of 1388 4124 WindowsLibrary.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe"C:\Users\Admin\AppData\Local\Temp\be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SYSTEM32\SCHtAsKs.EXe"SCHtAsKs.EXe" /create /tn WindowUpdates1641037013 /tr "C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exe" /st 01:57 /du 9999:59 /sc daily /ri 12⤵
- Creates scheduled task(s)
PID:1076
-
-
C:\Windows\SYSTEM32\SCHtAsKs.EXe"SCHtAsKs.EXe" /create /tn WindowUpdates1641037013 /tr "C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exe" /st 01:57 /du 9999:59 /sc daily /ri 12⤵
- Creates scheduled task(s)
PID:2068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1120
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exeC:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exe1⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\SCHtAsKs.EXe"SCHtAsKs.EXe" /create /tn WindowUpdates1641037013 /tr "C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exe" /st 01:58 /du 9999:59 /sc daily /ri 12⤵
- Creates scheduled task(s)
PID:2848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exeC:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exe1⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\system32\SCHtAsKs.EXe"SCHtAsKs.EXe" /create /tn WindowUpdates1641037013 /tr "C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exe" /st 01:59 /du 9999:59 /sc daily /ri 12⤵
- Creates scheduled task(s)
PID:4736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exeC:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\system32\SCHtAsKs.EXe"SCHtAsKs.EXe" /create /tn WindowUpdates1641037013 /tr "C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\WindowsLibrary.exe" /st 02:00 /du 9999:59 /sc daily /ri 12⤵
- Creates scheduled task(s)
PID:1388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD583efd99cf33380fb1979edf398c40bba
SHA1aba16dacba482997e627c9b57e66e1029cdbf89b
SHA256f98c3850c4237454265e0c8f29d2c1df6d843196b2fe3b4801d0c01627fba568
SHA5123fdb4487509628c143b92aa4a48344cce699f2fd1d30fbe9eae32ea932694ff4ca0425e42b1649749cce442a3c63a14c0d07651ae912f406ffc6b46b28c2b127
-
Filesize
474KB
MD5ec3e0e37a0706e727186ef4a1d338b48
SHA1549d90919104da57c9ed2e6cbc3d4a654b32162b
SHA256be9880ef9ccc6b51f6e22e21884bf7092da435c96a072bd9e9515eb88b7c6bd5
SHA5126010946af214b0015b899f1fb1086a66a0e5d0851a35256f3294ea92e3557912cd129569220c69a4f593db37ad9027c3c7c297f904965ea9cc2e8af61a7a0862