Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2024 23:24

General

  • Target

    SecuriteInfo.com.Win32.DropperX-gen.20947.10834.exe

  • Size

    128KB

  • MD5

    ff1345a5d3793e5e16f0151559173127

  • SHA1

    2df0cad48f2864ab08fbb154e3f668483af8d259

  • SHA256

    c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b

  • SHA512

    2da1cfbb5572bba3144868420cb48dd0d40d0c1b9aaaaa52672e2dfea4b8bf0b0922260659eda7487828c03fae9d87b615208482dd66ab548006ffea9741ded3

  • SSDEEP

    1536:AeyWofcZ1MTiR/dj6rdQUCQybhtBTYDct+9DdbqQOPJbJ7v0VijU0tE9u:/6TiGrghrYDcMrObB0VijVE9u

Malware Config

Signatures

  • Detect ZGRat V1 37 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.20947.10834.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.20947.10834.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.20947.10834.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.20947.10834.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:6156
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:6060
  • C:\Users\Admin\AppData\Local\Temp\vdayceoi.exe
    C:\Users\Admin\AppData\Local\Temp\vdayceoi.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:6880
    • C:\Users\Admin\AppData\Local\Temp\vdayceoi.exe
      "C:\Users\Admin\AppData\Local\Temp\vdayceoi.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:7112
      • C:\Users\Admin\AppData\Local\Temp\Lblvuwufhki.exe
        "C:\Users\Admin\AppData\Local\Temp\Lblvuwufhki.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:6832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.DropperX-gen.20947.10834.exe.log

    Filesize

    1KB

    MD5

    f3eb81974dc5933681e933f07209ff5f

    SHA1

    7af8cae0f1d03e82daaf784df9886705685baac7

    SHA256

    e82069884dd428bd6a1c67fe00c5fa56f9c4d62b538b694694a699588f1f4ab2

    SHA512

    d9aa3871dffb76c8a73a7940fa03bbc9b65cf575cbd07f7c1fbf490cb0f3d670415eaef0bf79e34689f61ab3cdfbb104efdef004becc12e54b501f02f948aaff

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vdayceoi.exe.log

    Filesize

    805B

    MD5

    58a9108e39c2ea50e65c23be3a9407cf

    SHA1

    fb21f7b9330aa1a77080a3243b81b49035102d7b

    SHA256

    6049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b

    SHA512

    93804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf

  • C:\Users\Admin\AppData\Local\Temp\Brxkw.tmpdb

    Filesize

    124KB

    MD5

    9618e15b04a4ddb39ed6c496575f6f95

    SHA1

    1c28f8750e5555776b3c80b187c5d15a443a7412

    SHA256

    a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

    SHA512

    f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

  • C:\Users\Admin\AppData\Local\Temp\Vvnxylieh.tmpdb

    Filesize

    160KB

    MD5

    f310cf1ff562ae14449e0167a3e1fe46

    SHA1

    85c58afa9049467031c6c2b17f5c12ca73bb2788

    SHA256

    e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

    SHA512

    1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

  • C:\Users\Admin\AppData\Local\Temp\vdayceoi.exe

    Filesize

    3.0MB

    MD5

    e5b17f857d175e73ec7e01b3798681bc

    SHA1

    209dcbe754ea979cc64c42c6c259673e4cd5bc57

    SHA256

    35915ae50a51401e9d9fbbbdccba0e83d6f48f18caaec3fe9d80a6747d7d88de

    SHA512

    2b43a6a015fc925be8c971a75b7f19b1a1aa99066ab33439aac5baf2ee68583ed0abd9292572c4ddb7ef51df49bd878da359369633343551776232028d940ba8

  • \??\c:\users\admin\appdata\roaming\yyuenpkjc.exe

    Filesize

    128KB

    MD5

    ff1345a5d3793e5e16f0151559173127

    SHA1

    2df0cad48f2864ab08fbb154e3f668483af8d259

    SHA256

    c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b

    SHA512

    2da1cfbb5572bba3144868420cb48dd0d40d0c1b9aaaaa52672e2dfea4b8bf0b0922260659eda7487828c03fae9d87b615208482dd66ab548006ffea9741ded3

  • memory/1100-59-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-23-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-3-0x0000000006910000-0x0000000006BC0000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-4-0x00000000071B0000-0x0000000007754000-memory.dmp

    Filesize

    5.6MB

  • memory/1100-5-0x0000000006E00000-0x0000000006E92000-memory.dmp

    Filesize

    584KB

  • memory/1100-9-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-15-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-7-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-6-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-27-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-65-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-17-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-13-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-11-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-51-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-45-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-39-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-33-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-31-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-30-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-25-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-2-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1100-21-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-49-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-61-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-63-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-69-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-67-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-1-0x0000000000D30000-0x0000000000D56000-memory.dmp

    Filesize

    152KB

  • memory/1100-57-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-0-0x000000007494E000-0x000000007494F000-memory.dmp

    Filesize

    4KB

  • memory/1100-55-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-19-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-47-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-43-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-41-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-37-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-35-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/1100-4886-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1100-4888-0x0000000005F10000-0x0000000005F5C000-memory.dmp

    Filesize

    304KB

  • memory/1100-4887-0x0000000006060000-0x000000000614A000-memory.dmp

    Filesize

    936KB

  • memory/1100-4889-0x0000000005F60000-0x0000000005FB4000-memory.dmp

    Filesize

    336KB

  • memory/1100-4904-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1100-53-0x0000000006910000-0x0000000006BB9000-memory.dmp

    Filesize

    2.7MB

  • memory/3908-4894-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/3908-4905-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3908-5106-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3908-7115-0x0000000005430000-0x0000000005486000-memory.dmp

    Filesize

    344KB

  • memory/3908-7116-0x0000000005660000-0x00000000056C6000-memory.dmp

    Filesize

    408KB

  • memory/3908-7118-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3908-4895-0x00000000052D0000-0x00000000053B8000-memory.dmp

    Filesize

    928KB

  • memory/6156-12006-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/6156-12001-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/6156-7120-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/6156-7119-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/6880-14227-0x0000000000410000-0x000000000071C000-memory.dmp

    Filesize

    3.0MB

  • memory/6880-14228-0x00000000051B0000-0x000000000549C000-memory.dmp

    Filesize

    2.9MB

  • memory/6880-19109-0x0000000007000000-0x0000000007128000-memory.dmp

    Filesize

    1.2MB

  • memory/7112-19114-0x00000000009A0000-0x0000000000A78000-memory.dmp

    Filesize

    864KB

  • memory/7112-19115-0x0000000004EA0000-0x0000000004FB6000-memory.dmp

    Filesize

    1.1MB

  • memory/7112-21415-0x00000000059C0000-0x0000000005A30000-memory.dmp

    Filesize

    448KB

  • memory/7112-21414-0x0000000005180000-0x000000000521E000-memory.dmp

    Filesize

    632KB

  • memory/7112-21416-0x0000000005560000-0x000000000556A000-memory.dmp

    Filesize

    40KB

  • memory/7112-21417-0x0000000006560000-0x00000000065DA000-memory.dmp

    Filesize

    488KB