Analysis

  • max time kernel
    31s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 07:06

General

  • Target

    39c6052f544fa39be7c80c5461085bc4a9793dba92327a3a2be213305e548885.exe

  • Size

    416KB

  • MD5

    4e602bffee9a8773c34be37e14d07353

  • SHA1

    9843d1ca9f478fb54060d0413b227d0eaa1fa938

  • SHA256

    39c6052f544fa39be7c80c5461085bc4a9793dba92327a3a2be213305e548885

  • SHA512

    98462cf39efd2ed06de56ad387a0fc58d07a8baf747bfeff24220f23112780fd0a022c20cdb687ea40734965f1617c438f081b2ad9b38f8b8080b581ed8f57ff

  • SSDEEP

    6144:uE9fYb7tyBIBFPOofY+dZLomCu9PVDro/rTsKIknXjrxPmHQTNWekuMiq:uEeHtJBFNYnKJro/rIKdXjF+w8Huq

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Detect ZGRat V1 3 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39c6052f544fa39be7c80c5461085bc4a9793dba92327a3a2be213305e548885.exe
    "C:\Users\Admin\AppData\Local\Temp\39c6052f544fa39be7c80c5461085bc4a9793dba92327a3a2be213305e548885.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\u1mg.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u1mg.0.exe"
      2⤵
      • Executes dropped EXE
      PID:3580
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 2204
        3⤵
        • Program crash
        PID:5108
    • C:\Users\Admin\AppData\Local\Temp\u1mg.1.exe
      "C:\Users\Admin\AppData\Local\Temp\u1mg.1.exe"
      2⤵
        PID:2600
        • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
          "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
          3⤵
            PID:2844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 1144
          2⤵
          • Program crash
          PID:4328
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4244 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2104 -ip 2104
          1⤵
            PID:4880
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2328 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:3
            1⤵
              PID:1488
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3580 -ip 3580
              1⤵
                PID:4356

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Are.docx

                Filesize

                11KB

                MD5

                a33e5b189842c5867f46566bdbf7a095

                SHA1

                e1c06359f6a76da90d19e8fd95e79c832edb3196

                SHA256

                5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                SHA512

                f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

              • C:\ProgramData\mozglue.dll

                Filesize

                593KB

                MD5

                c8fd9be83bc728cc04beffafc2907fe9

                SHA1

                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                SHA256

                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                SHA512

                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

              • C:\ProgramData\nss3.dll

                Filesize

                2.0MB

                MD5

                1cc453cdf74f31e4d913ff9c10acdde2

                SHA1

                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                SHA256

                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                SHA512

                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                Filesize

                2B

                MD5

                d751713988987e9331980363e24189ce

                SHA1

                97d170e1550eee4afc0af065b78cda302a97674c

                SHA256

                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                SHA512

                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                Filesize

                40B

                MD5

                20d4b8fa017a12a108c87f540836e250

                SHA1

                1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                SHA256

                6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                SHA512

                507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

              • C:\Users\Admin\AppData\Local\Temp\u1mg.0.exe

                Filesize

                275KB

                MD5

                83493b3717b3e54113b89fe0e5b765a1

                SHA1

                0e0b8f1f0a18258e9130f151c06b163418f7a90e

                SHA256

                3cf852a87b37cd494844030de64eec372931b19570a10e0896fc18c94bb99627

                SHA512

                85dd3e6cfc6ed41fe045627d5f701455d94320e7ad21e2ffaff55607b390224e70b2923c2e327e68463fe91a84755fc04f3e3e753720c7d0ede53ba129df0121

              • C:\Users\Admin\AppData\Local\Temp\u1mg.1.exe

                Filesize

                4.6MB

                MD5

                397926927bca55be4a77839b1c44de6e

                SHA1

                e10f3434ef3021c399dbba047832f02b3c898dbd

                SHA256

                4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                SHA512

                cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

              • memory/2104-13-0x0000000000400000-0x0000000002B25000-memory.dmp

                Filesize

                39.1MB

              • memory/2104-1-0x0000000002CA0000-0x0000000002DA0000-memory.dmp

                Filesize

                1024KB

              • memory/2104-17-0x0000000000400000-0x000000000046F000-memory.dmp

                Filesize

                444KB

              • memory/2104-16-0x0000000002EA0000-0x0000000002F0C000-memory.dmp

                Filesize

                432KB

              • memory/2104-15-0x0000000002CA0000-0x0000000002DA0000-memory.dmp

                Filesize

                1024KB

              • memory/2104-65-0x0000000000400000-0x000000000046F000-memory.dmp

                Filesize

                444KB

              • memory/2104-64-0x0000000000400000-0x0000000002B25000-memory.dmp

                Filesize

                39.1MB

              • memory/2104-3-0x0000000000400000-0x000000000046F000-memory.dmp

                Filesize

                444KB

              • memory/2104-2-0x0000000002EA0000-0x0000000002F0C000-memory.dmp

                Filesize

                432KB

              • memory/2600-150-0x0000000000400000-0x00000000008AD000-memory.dmp

                Filesize

                4.7MB

              • memory/2600-135-0x0000000000400000-0x00000000008AD000-memory.dmp

                Filesize

                4.7MB

              • memory/2600-80-0x0000000000400000-0x00000000008AD000-memory.dmp

                Filesize

                4.7MB

              • memory/2844-170-0x000001C24EC80000-0x000001C24EC8A000-memory.dmp

                Filesize

                40KB

              • memory/2844-179-0x000001C2535C0000-0x000001C2535C8000-memory.dmp

                Filesize

                32KB

              • memory/2844-188-0x000001C253D10000-0x000001C253D2E000-memory.dmp

                Filesize

                120KB

              • memory/2844-187-0x000001C253DB0000-0x000001C253E26000-memory.dmp

                Filesize

                472KB

              • memory/2844-186-0x000001C253CD0000-0x000001C253CDC000-memory.dmp

                Filesize

                48KB

              • memory/2844-183-0x000001C254CE0000-0x000001C255208000-memory.dmp

                Filesize

                5.2MB

              • memory/2844-156-0x000001C230DF0000-0x000001C234624000-memory.dmp

                Filesize

                56.2MB

              • memory/2844-180-0x000001C254730000-0x000001C25473A000-memory.dmp

                Filesize

                40KB

              • memory/2844-181-0x000001C254750000-0x000001C2547B2000-memory.dmp

                Filesize

                392KB

              • memory/2844-182-0x000001C253CB0000-0x000001C253CD2000-memory.dmp

                Filesize

                136KB

              • memory/2844-160-0x000001C24EDD0000-0x000001C24EEDA000-memory.dmp

                Filesize

                1.0MB

              • memory/2844-162-0x000001C24ECB0000-0x000001C24ECBC000-memory.dmp

                Filesize

                48KB

              • memory/2844-161-0x000001C24EC20000-0x000001C24EC30000-memory.dmp

                Filesize

                64KB

              • memory/2844-163-0x000001C24ECA0000-0x000001C24ECB4000-memory.dmp

                Filesize

                80KB

              • memory/2844-164-0x000001C24EF30000-0x000001C24EF54000-memory.dmp

                Filesize

                144KB

              • memory/2844-165-0x000001C24F0A0000-0x000001C24F0AA000-memory.dmp

                Filesize

                40KB

              • memory/2844-166-0x000001C24F0E0000-0x000001C24F10A000-memory.dmp

                Filesize

                168KB

              • memory/2844-167-0x000001C24F110000-0x000001C24F1C2000-memory.dmp

                Filesize

                712KB

              • memory/2844-168-0x000001C24F210000-0x000001C24F260000-memory.dmp

                Filesize

                320KB

              • memory/2844-169-0x000001C24F1C0000-0x000001C24F1E2000-memory.dmp

                Filesize

                136KB

              • memory/2844-178-0x000001C2535A0000-0x000001C2535AE000-memory.dmp

                Filesize

                56KB

              • memory/2844-174-0x000001C24F260000-0x000001C24F560000-memory.dmp

                Filesize

                3.0MB

              • memory/2844-176-0x000001C252ED0000-0x000001C252ED8000-memory.dmp

                Filesize

                32KB

              • memory/2844-177-0x000001C2535D0000-0x000001C253608000-memory.dmp

                Filesize

                224KB

              • memory/3580-18-0x0000000000400000-0x0000000002B02000-memory.dmp

                Filesize

                39.0MB

              • memory/3580-108-0x0000000000400000-0x0000000002B02000-memory.dmp

                Filesize

                39.0MB

              • memory/3580-159-0x0000000000400000-0x0000000002B02000-memory.dmp

                Filesize

                39.0MB

              • memory/3580-158-0x0000000000400000-0x0000000002B02000-memory.dmp

                Filesize

                39.0MB

              • memory/3580-157-0x0000000000400000-0x0000000002B02000-memory.dmp

                Filesize

                39.0MB

              • memory/3580-19-0x0000000000400000-0x0000000002B02000-memory.dmp

                Filesize

                39.0MB

              • memory/3580-20-0x0000000000400000-0x0000000002B02000-memory.dmp

                Filesize

                39.0MB

              • memory/3580-41-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                Filesize

                972KB

              • memory/3580-76-0x0000000000400000-0x0000000002B02000-memory.dmp

                Filesize

                39.0MB