Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2024 11:41

General

  • Target

    Inv.exe

  • Size

    2.7MB

  • MD5

    fb5b5bb52db5f467f602723270d9ff4d

  • SHA1

    739eb78f0f4ce08260b47d2b8636a277848db723

  • SHA256

    40fd6067985c30bfc7e64bb84b85f98665269c57992ec9254e52aa39da713539

  • SHA512

    62f0f7c333f05505349300eafaf16ab3b5557e267df7fee15f1184777903e50c9e97d5e4594a80371b1f681589fd07f48c7c69949062e940ee67234b6b3bc638

  • SSDEEP

    49152:s6l45exza56E6zlxlS1zVGqhAXWH6rJ+YMDlcjdUUF/4cVuvC:NS5exU6E4xcthSA6rJMDeBwU

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Inv.exe
    "C:\Users\Admin\AppData\Local\Temp\Inv.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1792-4903-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1792-11129-0x0000000074C30000-0x000000007531E000-memory.dmp

    Filesize

    6.9MB

  • memory/1792-5269-0x0000000074C30000-0x000000007531E000-memory.dmp

    Filesize

    6.9MB

  • memory/1792-4905-0x0000000000750000-0x000000000082C000-memory.dmp

    Filesize

    880KB

  • memory/2880-46-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-40-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-62-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-6-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-10-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-44-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-42-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-14-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-38-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-36-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-34-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-32-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-16-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-28-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-26-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-24-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-22-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-20-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-0-0x0000000074C3E000-0x0000000074C3F000-memory.dmp

    Filesize

    4KB

  • memory/2880-18-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-30-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-12-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-4-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-64-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-66-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-48-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-50-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-52-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-54-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-56-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-60-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-58-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-4883-0x0000000074C30000-0x000000007531E000-memory.dmp

    Filesize

    6.9MB

  • memory/2880-4884-0x0000000074C30000-0x000000007531E000-memory.dmp

    Filesize

    6.9MB

  • memory/2880-4886-0x0000000002350000-0x000000000239C000-memory.dmp

    Filesize

    304KB

  • memory/2880-4885-0x0000000005680000-0x000000000574E000-memory.dmp

    Filesize

    824KB

  • memory/2880-4887-0x00000000024F0000-0x0000000002544000-memory.dmp

    Filesize

    336KB

  • memory/2880-3-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-8-0x0000000004D40000-0x0000000004FCB000-memory.dmp

    Filesize

    2.5MB

  • memory/2880-4904-0x0000000074C30000-0x000000007531E000-memory.dmp

    Filesize

    6.9MB

  • memory/2880-2-0x0000000004D40000-0x0000000004FD2000-memory.dmp

    Filesize

    2.6MB

  • memory/2880-1-0x00000000002C0000-0x0000000000570000-memory.dmp

    Filesize

    2.7MB