Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 11:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Inv.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Inv.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
Inv.exe
-
Size
2.7MB
-
MD5
fb5b5bb52db5f467f602723270d9ff4d
-
SHA1
739eb78f0f4ce08260b47d2b8636a277848db723
-
SHA256
40fd6067985c30bfc7e64bb84b85f98665269c57992ec9254e52aa39da713539
-
SHA512
62f0f7c333f05505349300eafaf16ab3b5557e267df7fee15f1184777903e50c9e97d5e4594a80371b1f681589fd07f48c7c69949062e940ee67234b6b3bc638
-
SSDEEP
49152:s6l45exza56E6zlxlS1zVGqhAXWH6rJ+YMDlcjdUUF/4cVuvC:NS5exU6E4xcthSA6rJMDeBwU
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral2/memory/4436-2-0x0000000005690000-0x0000000005922000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-12-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-20-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-42-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-52-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-44-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-40-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-38-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-34-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-32-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-30-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-24-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-36-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-28-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-26-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-22-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-18-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-16-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-14-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-8-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-6-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-10-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-5-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-64-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-68-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-66-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-62-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-60-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-58-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-56-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-54-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-50-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-48-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/4436-46-0x0000000005690000-0x000000000591B000-memory.dmp family_zgrat_v1 behavioral2/memory/2712-4895-0x00000000049E0000-0x0000000004ABC000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qiozmrce = "C:\\Users\\Admin\\AppData\\Roaming\\Qiozmrce.exe" Inv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4436 set thread context of 2712 4436 Inv.exe 86 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4436 Inv.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4436 Inv.exe Token: SeDebugPrivilege 4436 Inv.exe Token: SeDebugPrivilege 2712 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4436 wrote to memory of 2712 4436 Inv.exe 86 PID 4436 wrote to memory of 2712 4436 Inv.exe 86 PID 4436 wrote to memory of 2712 4436 Inv.exe 86 PID 4436 wrote to memory of 2712 4436 Inv.exe 86 PID 4436 wrote to memory of 2712 4436 Inv.exe 86 PID 4436 wrote to memory of 2712 4436 Inv.exe 86 PID 4436 wrote to memory of 2712 4436 Inv.exe 86 PID 4436 wrote to memory of 2712 4436 Inv.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inv.exe"C:\Users\Admin\AppData\Local\Temp\Inv.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
-