Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 17:43

General

  • Target

    c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe

  • Size

    128KB

  • MD5

    ff1345a5d3793e5e16f0151559173127

  • SHA1

    2df0cad48f2864ab08fbb154e3f668483af8d259

  • SHA256

    c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b

  • SHA512

    2da1cfbb5572bba3144868420cb48dd0d40d0c1b9aaaaa52672e2dfea4b8bf0b0922260659eda7487828c03fae9d87b615208482dd66ab548006ffea9741ded3

  • SSDEEP

    1536:AeyWofcZ1MTiR/dj6rdQUCQybhtBTYDct+9DdbqQOPJbJ7v0VijU0tE9u:/6TiGrghrYDcMrObB0VijVE9u

Malware Config

Signatures

  • Detect ZGRat V1 37 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe
    "C:\Users\Admin\AppData\Local\Temp\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe
      "C:\Users\Admin\AppData\Local\Temp\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4328
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5308
  • C:\Users\Admin\AppData\Local\Temp\yownexbjd.exe
    C:\Users\Admin\AppData\Local\Temp\yownexbjd.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5408
    • C:\Users\Admin\AppData\Local\Temp\yownexbjd.exe
      "C:\Users\Admin\AppData\Local\Temp\yownexbjd.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\Smpnwdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Smpnwdf.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5348
        • C:\Users\Admin\AppData\Local\Temp\Smpnwdf.exe
          "C:\Users\Admin\AppData\Local\Temp\Smpnwdf.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe.log

    Filesize

    1KB

    MD5

    f3eb81974dc5933681e933f07209ff5f

    SHA1

    7af8cae0f1d03e82daaf784df9886705685baac7

    SHA256

    e82069884dd428bd6a1c67fe00c5fa56f9c4d62b538b694694a699588f1f4ab2

    SHA512

    d9aa3871dffb76c8a73a7940fa03bbc9b65cf575cbd07f7c1fbf490cb0f3d670415eaef0bf79e34689f61ab3cdfbb104efdef004becc12e54b501f02f948aaff

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yownexbjd.exe.log

    Filesize

    805B

    MD5

    58a9108e39c2ea50e65c23be3a9407cf

    SHA1

    fb21f7b9330aa1a77080a3243b81b49035102d7b

    SHA256

    6049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b

    SHA512

    93804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf

  • C:\Users\Admin\AppData\Local\Temp\Eeiryiy.tmpdb

    Filesize

    124KB

    MD5

    9618e15b04a4ddb39ed6c496575f6f95

    SHA1

    1c28f8750e5555776b3c80b187c5d15a443a7412

    SHA256

    a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

    SHA512

    f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

  • C:\Users\Admin\AppData\Local\Temp\Reudw.tmpdb

    Filesize

    152KB

    MD5

    73bd1e15afb04648c24593e8ba13e983

    SHA1

    4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91

    SHA256

    aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b

    SHA512

    6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

  • C:\Users\Admin\AppData\Local\Temp\yownexbjd.exe

    Filesize

    3.0MB

    MD5

    e5b17f857d175e73ec7e01b3798681bc

    SHA1

    209dcbe754ea979cc64c42c6c259673e4cd5bc57

    SHA256

    35915ae50a51401e9d9fbbbdccba0e83d6f48f18caaec3fe9d80a6747d7d88de

    SHA512

    2b43a6a015fc925be8c971a75b7f19b1a1aa99066ab33439aac5baf2ee68583ed0abd9292572c4ddb7ef51df49bd878da359369633343551776232028d940ba8

  • \??\c:\users\admin\appdata\roaming\yyuenpkjc.exe

    Filesize

    128KB

    MD5

    ff1345a5d3793e5e16f0151559173127

    SHA1

    2df0cad48f2864ab08fbb154e3f668483af8d259

    SHA256

    c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b

    SHA512

    2da1cfbb5572bba3144868420cb48dd0d40d0c1b9aaaaa52672e2dfea4b8bf0b0922260659eda7487828c03fae9d87b615208482dd66ab548006ffea9741ded3

  • memory/2388-27-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-69-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-4-0x0000000007300000-0x00000000078A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2388-5-0x0000000006F50000-0x0000000006FE2000-memory.dmp

    Filesize

    584KB

  • memory/2388-7-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-6-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-13-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-29-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-37-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-61-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-17-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-67-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-65-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-63-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-59-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-57-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-55-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-53-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-51-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-47-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-45-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-43-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-41-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-35-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-49-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-31-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-39-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-33-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-2-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/2388-23-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-1-0x0000000000DC0000-0x0000000000DE6000-memory.dmp

    Filesize

    152KB

  • memory/2388-0-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/2388-3-0x0000000006A60000-0x0000000006D10000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-15-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-11-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-9-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-25-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-4886-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/2388-4887-0x0000000006650000-0x000000000673A000-memory.dmp

    Filesize

    936KB

  • memory/2388-4888-0x0000000006080000-0x00000000060CC000-memory.dmp

    Filesize

    304KB

  • memory/2388-4889-0x0000000006740000-0x0000000006794000-memory.dmp

    Filesize

    336KB

  • memory/2388-4917-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/2388-21-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2388-19-0x0000000006A60000-0x0000000006D09000-memory.dmp

    Filesize

    2.7MB

  • memory/2744-4896-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/2744-7116-0x0000000005630000-0x0000000005696000-memory.dmp

    Filesize

    408KB

  • memory/2744-4918-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/2744-4894-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/2744-7118-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/2744-7115-0x00000000053C0000-0x0000000005416000-memory.dmp

    Filesize

    344KB

  • memory/2744-4895-0x00000000019F0000-0x0000000001AD8000-memory.dmp

    Filesize

    928KB

  • memory/4328-7119-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/4328-7120-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/4328-12001-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/4328-12006-0x00000000745E0000-0x0000000074D90000-memory.dmp

    Filesize

    7.7MB

  • memory/5048-19115-0x0000000004E70000-0x0000000004F86000-memory.dmp

    Filesize

    1.1MB

  • memory/5048-21414-0x0000000005130000-0x00000000051CE000-memory.dmp

    Filesize

    632KB

  • memory/5048-21415-0x0000000005AB0000-0x0000000005B20000-memory.dmp

    Filesize

    448KB

  • memory/5048-21417-0x0000000006580000-0x00000000065FA000-memory.dmp

    Filesize

    488KB

  • memory/5048-19114-0x0000000000990000-0x0000000000A68000-memory.dmp

    Filesize

    864KB

  • memory/5048-21416-0x0000000005510000-0x000000000551A000-memory.dmp

    Filesize

    40KB

  • memory/5408-19109-0x00000000078A0000-0x00000000079C8000-memory.dmp

    Filesize

    1.2MB

  • memory/5408-14227-0x0000000000C40000-0x0000000000F4C000-memory.dmp

    Filesize

    3.0MB

  • memory/5408-14228-0x0000000005910000-0x0000000005BFC000-memory.dmp

    Filesize

    2.9MB