Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
ExecPubg.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
ExecPubg.exe
-
Size
2.8MB
-
MD5
ccdcccec419d5138153225379d909f16
-
SHA1
1dd689b6f27acf6d293c7f07b4b780053aa4dfeb
-
SHA256
ba1feee88bb96cdca22818dc5e450219ba77d0a5ff69d58f7c06140763ef6592
-
SHA512
9feee655a811442efcf3775af476c2fee0e3c424872a57192c848ac077198c9ab4b84e21cb4b897293864924300df4dc4750910c943ce6917fcd439c7467e949
-
SSDEEP
49152:Em7utXzs0b/50C8FD2c7um6q1Ro6os7yh/YpE1Bz7KO6LH/zXZTjV0k/nrVxod:E2es09SFDqHJlV/YpA3T6LLXZTjyk/Qd
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2460-3-0x000000001B720000-0x000000001B93E000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-19-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-4-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-27-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-29-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-7-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-25-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-33-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-35-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-37-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-45-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-43-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-41-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-47-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-39-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-31-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-23-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-21-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-17-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-15-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-13-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-11-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-9-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-5-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-49-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-51-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-67-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-53-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-65-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-63-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-61-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-59-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-57-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 behavioral1/memory/2460-55-0x000000001B720000-0x000000001B939000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaser = "C:\\Users\\Admin\\AppData\\Roaming\\jaser.exe" ExecPubg.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2460 ExecPubg.exe 2460 ExecPubg.exe 2460 ExecPubg.exe 2460 ExecPubg.exe 2460 ExecPubg.exe 2460 ExecPubg.exe 2460 ExecPubg.exe 2460 ExecPubg.exe 2460 ExecPubg.exe 2460 ExecPubg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2460 ExecPubg.exe Token: SeDebugPrivilege 2460 ExecPubg.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2896 2460 ExecPubg.exe 28 PID 2460 wrote to memory of 2896 2460 ExecPubg.exe 28 PID 2460 wrote to memory of 2896 2460 ExecPubg.exe 28 PID 2460 wrote to memory of 2472 2460 ExecPubg.exe 29 PID 2460 wrote to memory of 2472 2460 ExecPubg.exe 29 PID 2460 wrote to memory of 2472 2460 ExecPubg.exe 29 PID 2460 wrote to memory of 2524 2460 ExecPubg.exe 30 PID 2460 wrote to memory of 2524 2460 ExecPubg.exe 30 PID 2460 wrote to memory of 2524 2460 ExecPubg.exe 30 PID 2460 wrote to memory of 2588 2460 ExecPubg.exe 31 PID 2460 wrote to memory of 2588 2460 ExecPubg.exe 31 PID 2460 wrote to memory of 2588 2460 ExecPubg.exe 31 PID 2460 wrote to memory of 2600 2460 ExecPubg.exe 32 PID 2460 wrote to memory of 2600 2460 ExecPubg.exe 32 PID 2460 wrote to memory of 2600 2460 ExecPubg.exe 32 PID 2460 wrote to memory of 2536 2460 ExecPubg.exe 33 PID 2460 wrote to memory of 2536 2460 ExecPubg.exe 33 PID 2460 wrote to memory of 2536 2460 ExecPubg.exe 33 PID 2460 wrote to memory of 2484 2460 ExecPubg.exe 34 PID 2460 wrote to memory of 2484 2460 ExecPubg.exe 34 PID 2460 wrote to memory of 2484 2460 ExecPubg.exe 34 PID 2460 wrote to memory of 2656 2460 ExecPubg.exe 35 PID 2460 wrote to memory of 2656 2460 ExecPubg.exe 35 PID 2460 wrote to memory of 2656 2460 ExecPubg.exe 35 PID 2460 wrote to memory of 2412 2460 ExecPubg.exe 36 PID 2460 wrote to memory of 2412 2460 ExecPubg.exe 36 PID 2460 wrote to memory of 2412 2460 ExecPubg.exe 36 PID 2460 wrote to memory of 2872 2460 ExecPubg.exe 37 PID 2460 wrote to memory of 2872 2460 ExecPubg.exe 37 PID 2460 wrote to memory of 2872 2460 ExecPubg.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExecPubg.exe"C:\Users\Admin\AppData\Local\Temp\ExecPubg.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2896
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2524
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2600
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2536
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2484
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2412
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2872
-