Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 11:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Inv.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Inv.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
Inv.exe
-
Size
2.7MB
-
MD5
fb5b5bb52db5f467f602723270d9ff4d
-
SHA1
739eb78f0f4ce08260b47d2b8636a277848db723
-
SHA256
40fd6067985c30bfc7e64bb84b85f98665269c57992ec9254e52aa39da713539
-
SHA512
62f0f7c333f05505349300eafaf16ab3b5557e267df7fee15f1184777903e50c9e97d5e4594a80371b1f681589fd07f48c7c69949062e940ee67234b6b3bc638
-
SSDEEP
49152:s6l45exza56E6zlxlS1zVGqhAXWH6rJ+YMDlcjdUUF/4cVuvC:NS5exU6E4xcthSA6rJMDeBwU
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/2992-2-0x0000000004D30000-0x0000000004FC2000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-3-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-6-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-4-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-8-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-16-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-18-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-20-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-22-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-24-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-26-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-28-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-10-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-30-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-32-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-12-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-66-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-64-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-14-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-40-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-62-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-60-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-58-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-56-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-54-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-52-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-50-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-48-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-46-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-44-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-42-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-38-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-36-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2992-34-0x0000000004D30000-0x0000000004FBB000-memory.dmp family_zgrat_v1 behavioral1/memory/2172-4902-0x0000000004220000-0x00000000042FC000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qiozmrce = "C:\\Users\\Admin\\AppData\\Roaming\\Qiozmrce.exe" Inv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2992 set thread context of 2172 2992 Inv.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2992 Inv.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2992 Inv.exe Token: SeDebugPrivilege 2992 Inv.exe Token: SeDebugPrivilege 2172 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2172 2992 Inv.exe 28 PID 2992 wrote to memory of 2172 2992 Inv.exe 28 PID 2992 wrote to memory of 2172 2992 Inv.exe 28 PID 2992 wrote to memory of 2172 2992 Inv.exe 28 PID 2992 wrote to memory of 2172 2992 Inv.exe 28 PID 2992 wrote to memory of 2172 2992 Inv.exe 28 PID 2992 wrote to memory of 2172 2992 Inv.exe 28 PID 2992 wrote to memory of 2172 2992 Inv.exe 28 PID 2992 wrote to memory of 2172 2992 Inv.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inv.exe"C:\Users\Admin\AppData\Local\Temp\Inv.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2172
-