Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 01:33

General

  • Target

    2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b.exe

  • Size

    1.6MB

  • MD5

    d56b96a8200fd32fbb957aae4d5f1dcf

  • SHA1

    dfe1622444f408b41ab226c69269176dcb7246eb

  • SHA256

    2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b

  • SHA512

    88ef18694a6de802541644a5b63732848577f3d763453f3747b5105ab35711e17eb97c6758edfc843c3c5b795d6ad5a6f2e7bcbc84d3ab4f2e0fd2f06ab3413b

  • SSDEEP

    49152:ay6imwGhfj4GBT2z95Zw/L+gwnzanwyuPTh:azimw4f8iSuD+g

Malware Config

Signatures

  • Detect ZGRat V1 30 IoCs
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • ModiLoader Second Stage 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b.exe
    "C:\Users\Admin\AppData\Local\Temp\2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c mkdir "\\?\C:\Windows "
      2⤵
        PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c mkdir "\\?\C:\Windows \System32"
        2⤵
          PID:620
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Windows \System32\7267140.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1208
          • C:\Windows \System32\7267140.exe
            "C:\Windows \System32\7267140.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:964
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4604
              • C:\Windows\system32\cmd.exe
                cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:3884
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                  6⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3092
        • C:\Windows\SysWOW64\extrac32.exe
          C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b.exe C:\\Users\\Public\\Libraries\\Vyelsugj.PIF
          2⤵
            PID:4976
          • C:\Users\Public\Libraries\jgusleyV.pif
            C:\Users\Public\Libraries\jgusleyV.pif
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3164
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:4524

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4dwrmpw3.ech.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Public\Libraries\jgusleyV.pif

            Filesize

            66KB

            MD5

            c116d3604ceafe7057d77ff27552c215

            SHA1

            452b14432fb5758b46f2897aeccd89f7c82a727d

            SHA256

            7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

            SHA512

            9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

          • C:\Windows \System32\7267140.exe

            Filesize

            128KB

            MD5

            231ce1e1d7d98b44371ffff407d68b59

            SHA1

            25510d0f6353dbf0c9f72fc880de7585e34b28ff

            SHA256

            30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

            SHA512

            520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

          • C:\Windows \System32\netutils.dll

            Filesize

            112KB

            MD5

            8541304aadba4ae8620bb2699f6e0437

            SHA1

            e0b28a6ecd32d3789433217364c1006de9892df8

            SHA256

            50573c81e5773c13a5411e8446d7fb17956865675782239818f7affd40a2fecb

            SHA512

            c18b1233c138229705242e1cdc00970e45e414d8da9c643b1196ec9de261ae18076e22bed6fcc48c07d1f0e851469db9147f083f3c3c76a26b75994419392455

          • C:\windows \system32\KDECO.bat

            Filesize

            11KB

            MD5

            c545650595b479c81ad6b9d8882aae39

            SHA1

            7a98aa2e6eee23b3c1bba876955d525bc618b3f0

            SHA256

            a3a80983cb33159f0455fa0135789402558baa1460db94d0071318512b8cb5f9

            SHA512

            85ac596a7da9072a28c4178e4fdedc98f1b49c8e3fe5612cfe464833297b13f65d2dc59b52d7fc9970cff8f98d954111229aec0ed9dded454e03b0cf4ebb6ff3

          • memory/964-17-0x00000000613C0000-0x00000000613E3000-memory.dmp

            Filesize

            140KB

          • memory/3092-19-0x0000020A24510000-0x0000020A24532000-memory.dmp

            Filesize

            136KB

          • memory/3164-90-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-80-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-1143-0x000000004DDB0000-0x000000004DDBA000-memory.dmp

            Filesize

            40KB

          • memory/3164-1142-0x000000004DB80000-0x000000004DC12000-memory.dmp

            Filesize

            584KB

          • memory/3164-1140-0x000000004DAD0000-0x000000004DB6C000-memory.dmp

            Filesize

            624KB

          • memory/3164-1139-0x000000004DA80000-0x000000004DAD0000-memory.dmp

            Filesize

            320KB

          • memory/3164-42-0x0000000000400000-0x0000000001400000-memory.dmp

            Filesize

            16.0MB

          • memory/3164-39-0x0000000000400000-0x0000000001400000-memory.dmp

            Filesize

            16.0MB

          • memory/3164-44-0x0000000049B90000-0x0000000049BEC000-memory.dmp

            Filesize

            368KB

          • memory/3164-45-0x000000004C380000-0x000000004C924000-memory.dmp

            Filesize

            5.6MB

          • memory/3164-46-0x000000004C2A0000-0x000000004C2FA000-memory.dmp

            Filesize

            360KB

          • memory/3164-48-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-64-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-62-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-101-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-98-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-94-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-1136-0x000000004CA30000-0x000000004CA96000-memory.dmp

            Filesize

            408KB

          • memory/3164-88-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-86-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-82-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-47-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-78-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-76-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-75-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-70-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-66-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-60-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-58-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-56-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-54-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-52-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-96-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-92-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-84-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-50-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-72-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/3164-68-0x000000004C2A0000-0x000000004C2F5000-memory.dmp

            Filesize

            340KB

          • memory/4480-12-0x00000000007C0000-0x00000000007C1000-memory.dmp

            Filesize

            4KB

          • memory/4480-0-0x00000000007C0000-0x00000000007C1000-memory.dmp

            Filesize

            4KB

          • memory/4480-1-0x0000000002AD0000-0x0000000003AD0000-memory.dmp

            Filesize

            16.0MB

          • memory/4480-2-0x0000000000400000-0x00000000005AF000-memory.dmp

            Filesize

            1.7MB

          • memory/4480-3-0x0000000002AD0000-0x0000000003AD0000-memory.dmp

            Filesize

            16.0MB

          • memory/4480-5-0x0000000000400000-0x00000000005AF000-memory.dmp

            Filesize

            1.7MB