Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 20:24
Behavioral task
behavioral1
Sample
ChineseTriad/Installer.exe
Resource
win10v2004-20240419-en
General
-
Target
ChineseTriad/Installer.exe
-
Size
472KB
-
MD5
fc032e9bac8d0a7dc77f1ce1d01fe91f
-
SHA1
614469892aa6b7e09e5e107fb6b791a85701dffc
-
SHA256
01f4fb08ec4c575c2148e9c86a6c7e850a33f48cdd632e8b75fed224dd01ae89
-
SHA512
de1f1457122b889de6bc10576d5ac4b0f577d9daebf30dd36c693dbb75c11ab27d6e2c4328384caa5aa1ff63b0195bd4257c4f8194f21017e69707f40f61f9b0
-
SSDEEP
12288:sb3B1kiKP156uhoDDoqi/Rh3O9hRLkCr3rCbAnFb:sb33kiKt5+oqwh3O9htkI7Jl
Malware Config
Extracted
lumma
https://auctiongutollyjkui.shop/api
https://acceptabledcooeprs.shop/api
https://obsceneclassyjuwks.shop/api
https://zippyfinickysofwps.shop/api
https://miniaturefinerninewjs.shop/api
https://plaintediousidowsko.shop/api
https://sweetsquarediaslw.shop/api
https://holicisticscrarws.shop/api
https://boredimperissvieos.shop/api
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/4584-1-0x00000000004A0000-0x000000000051A000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4584 set thread context of 3508 4584 Installer.exe 84 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4584 wrote to memory of 3508 4584 Installer.exe 84 PID 4584 wrote to memory of 3508 4584 Installer.exe 84 PID 4584 wrote to memory of 3508 4584 Installer.exe 84 PID 4584 wrote to memory of 3508 4584 Installer.exe 84 PID 4584 wrote to memory of 3508 4584 Installer.exe 84 PID 4584 wrote to memory of 3508 4584 Installer.exe 84 PID 4584 wrote to memory of 3508 4584 Installer.exe 84 PID 4584 wrote to memory of 3508 4584 Installer.exe 84 PID 4584 wrote to memory of 3508 4584 Installer.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChineseTriad\Installer.exe"C:\Users\Admin\AppData\Local\Temp\ChineseTriad\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3508
-