Resubmissions
05-05-2024 22:14
240505-15wpwafd5z 1005-05-2024 22:10
240505-13wbbsac76 705-05-2024 22:10
240505-13jbrsfc8x 305-05-2024 22:06
240505-11kf2sfc4w 805-05-2024 22:06
240505-1z6b5aab93 305-05-2024 21:58
240505-1vskgaaa72 705-05-2024 21:56
240505-1tfvaaaa42 3Analysis
-
max time kernel
104s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
ForMyFriends.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ForMyFriends.rar
Resource
win10v2004-20240419-en
General
-
Target
ForMyFriends.rar
-
Size
368KB
-
MD5
e5dffe249ace4087f23b2b20eea988a5
-
SHA1
9622701158cd5defc558b2c78b3281ce26d42eaa
-
SHA256
7c419b375dff5ab052c86131a714a80b5506f78cfbba3fd7b990afc0a6ff4110
-
SHA512
466354de558125d256064abc7b5b7fb7ddb2293be32accb577b31b08c779769a839eae521dd17642b041c150fd3acc4abeea66300c9a9a083b0bad401bfb5e41
-
SSDEEP
6144:vtX3fnGv4ndmVfh9zppZI6w/ub1OGjjpsV9gBm1Z6CiZE3+WdGqLiqW:vtXPn9nUVfh9zy6w/uN6gBi2E3+e+N
Malware Config
Signatures
-
Detect ZGRat V1 5 IoCs
resource yara_rule behavioral1/files/0x002c00000001450f-28.dat family_zgrat_v1 behavioral1/memory/2936-36-0x00000000001F0000-0x0000000000268000-memory.dmp family_zgrat_v1 behavioral1/memory/2300-58-0x0000000001340000-0x00000000013B8000-memory.dmp family_zgrat_v1 behavioral1/memory/1540-76-0x0000000000DF0000-0x0000000000E68000-memory.dmp family_zgrat_v1 behavioral1/memory/1824-94-0x0000000001210000-0x0000000001288000-memory.dmp family_zgrat_v1 -
Executes dropped EXE 4 IoCs
pid Process 2936 loader.exe 2300 loader.exe 1540 loader.exe 1824 loader.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2936 set thread context of 2724 2936 loader.exe 31 PID 2300 set thread context of 400 2300 loader.exe 41 PID 1540 set thread context of 1764 1540 loader.exe 43 PID 1824 set thread context of 992 1824 loader.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2580 7zFM.exe 2580 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2580 7zFM.exe Token: 35 2580 7zFM.exe Token: SeSecurityPrivilege 2580 7zFM.exe Token: SeSecurityPrivilege 2580 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2580 7zFM.exe 2580 7zFM.exe 2580 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2580 1440 cmd.exe 29 PID 1440 wrote to memory of 2580 1440 cmd.exe 29 PID 1440 wrote to memory of 2580 1440 cmd.exe 29 PID 2580 wrote to memory of 2936 2580 7zFM.exe 30 PID 2580 wrote to memory of 2936 2580 7zFM.exe 30 PID 2580 wrote to memory of 2936 2580 7zFM.exe 30 PID 2580 wrote to memory of 2936 2580 7zFM.exe 30 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2936 wrote to memory of 2724 2936 loader.exe 31 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 2300 wrote to memory of 400 2300 loader.exe 41 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1540 wrote to memory of 1764 1540 loader.exe 43 PID 1824 wrote to memory of 908 1824 loader.exe 45 PID 1824 wrote to memory of 908 1824 loader.exe 45 PID 1824 wrote to memory of 908 1824 loader.exe 45 PID 1824 wrote to memory of 908 1824 loader.exe 45 PID 1824 wrote to memory of 908 1824 loader.exe 45 PID 1824 wrote to memory of 908 1824 loader.exe 45 PID 1824 wrote to memory of 908 1824 loader.exe 45 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46 PID 1824 wrote to memory of 992 1824 loader.exe 46
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ForMyFriends.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ForMyFriends.rar"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\7zO41AD9F96\loader.exe"C:\Users\Admin\AppData\Local\Temp\7zO41AD9F96\loader.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2724
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD52da0391abfceede588c711be9dc6a62e
SHA12f0049509bff9ae7282d181178442006b99a161c
SHA256575263f5ab5301061aead61fd0bef20a97930a09682772d96ac6ed98d3d6c2a9
SHA512f8d422a9a7e9557c3e4046cdd758f5ce96546e9cb52df4cd2770782e39f7049144e8b2949c72174456083ff02bef42920da7f79349f4519daa5982ef9e6644e4