Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 00:08
Behavioral task
behavioral1
Sample
deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe
Resource
win7-20240221-en
5 signatures
300 seconds
General
-
Target
deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe
-
Size
472KB
-
MD5
46c72d686c836f3c97ce18b81b0d9864
-
SHA1
fdadd2e3cd971cd9fffb3de0f4a69ed0f77ae4a5
-
SHA256
deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1
-
SHA512
1ab8c8967155913c5dd0e2853d663bb096571062680de246fdda370947f7b6c3d2f44b85be97b821c630a4a42b3990d78601615737c3ced1418c9ccf18611208
-
SSDEEP
12288:ub3IzlSJCfjT1CDcLfSsYxolZ0B3HpCO00N4:ub3gMMT1iqSRxovg3HE+4
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1744-1-0x0000000000290000-0x000000000030A000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1744 set thread context of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2676 2648 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 1744 wrote to memory of 2648 1744 deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe 28 PID 2648 wrote to memory of 2676 2648 RegAsm.exe 29 PID 2648 wrote to memory of 2676 2648 RegAsm.exe 29 PID 2648 wrote to memory of 2676 2648 RegAsm.exe 29 PID 2648 wrote to memory of 2676 2648 RegAsm.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe"C:\Users\Admin\AppData\Local\Temp\deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 2523⤵
- Program crash
PID:2676
-
-