Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 01:53
Behavioral task
behavioral1
Sample
5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe
Resource
win10v2004-20240419-en
General
-
Target
5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe
-
Size
2.6MB
-
MD5
33559005506dae5967c8ddeaa8a65f5b
-
SHA1
0d3c40848c443d4c7dbada45fe976cb9f616c9c2
-
SHA256
5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79
-
SHA512
1591fe81d82b18b854299b0ccc72ec2f31208a9ab11afd75047a3d2e3b2ae7931bd412a8401eff57790348ddb5463c31dfc3f870a6c9eef8ef86006b55be7e55
-
SSDEEP
49152:xDmflSXRl/s9YcuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9u:xDmflEVsGfzsG1tQRjdih8rwc
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1916-1-0x00000000010E0000-0x000000000137A000-memory.dmp family_zgrat_v1 -
Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
resource yara_rule behavioral1/memory/1916-1-0x00000000010E0000-0x000000000137A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawPaste_URL -
Detects executables packed with unregistered version of .NET Reactor 1 IoCs
resource yara_rule behavioral1/memory/1916-1-0x00000000010E0000-0x000000000137A000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1916-1-0x00000000010E0000-0x000000000137A000-memory.dmp net_reactor -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mEfY4MyaNCE76J6t.exe 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mEfY4MyaNCE76J6t.exe 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com 5 api.ipify.org 6 api.ipify.org 7 icanhazip.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Cash.img" 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\IpsPlugin.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tipresx.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_2.emf.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shorthand.emf.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\DirectDB.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\it-IT\wab32res.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\msgfilt.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\FlickLearningWizard.exe.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed.xrm-ms.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\micaut.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPCEXT.DLL.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcatlm.dat.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IpsMigrationPlugin.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipTsf.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\msinfo32.exe.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\msadc\handler.reg.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Microsoft.Ink.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\rtscom.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcf.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-phonetic.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\ado\msader15.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\FlickLearningWizard.exe.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\TipRes.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\IPSEventLogMsg.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\ado\msadox.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\sqloledb.rll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(cm).wmf.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrb.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tabskb.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tipresx.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_jpn.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee100.tlb.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\rtscom.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(inch).wmf.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdasqlr.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tipresx.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\CsiSoap.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcvbs.inc.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\msdasqlr.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\oledb32r.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwruksh.dat.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\rtscom.dll.mui.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadco.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\imjplm.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\VSTOInstallerUI.dll.CashRansomware 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe"C:\Users\Admin\AppData\Local\Temp\5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5ba92574b102a7d4329ea560d729ab48d
SHA1cb0f07c3460faefc5f2ca5f322c24af8e5314341
SHA256f94dc355fa74a4cfc5834326e93d326c3dc41a4ce1b2774b086056cab9bcf2fc
SHA512a83775c3ee1f00103e9d8f49b1420796e7468d1e3041b252c033111a446cb35be748e0fe7db537ff78dc3971dbf82bf6847bf08765ec4647f1e3698519ae30b6
-
Filesize
8KB
MD5efd109a7d2ab0bf4781caab1fcedae0f
SHA1d8ddc8d859bb73ced36931fb745214db7160aef9
SHA2565774ddf49633f351809e7868e4eaf81c8c3bba7eb3a8c8d53a7e40c29d322dbe
SHA512396e54829d26c231523269754c10073b9ed05aeb793b66f13ded1e33ccf602363e0d90abf50b77d4f7a4dde2ffa7cd583e2afdf23b9b6f7a7bdf86821497787f
-
Filesize
80B
MD5a447d92fdf5639e96d301503e0905e1a
SHA1dcdd8a9563ce87306f041be5f97ae6c80486c309
SHA25650f428a339fdc6501c343cff412922c7616a4055eb8c261efc697e52550df199
SHA5122cc04e609b97b634c9c0590dbee13496efc770b95a2abde93b9516f08415fe1692e37ba378ca325574c3be4681f10e8eca53a8529704f8933dae6dee2ee4d5ce
-
Filesize
28KB
MD570f38593070334d9655247d740a21951
SHA1a0227888712753d7a5dea316593a5d2728b50aff
SHA25649d1d1a154881bbb7a8da7c29cf9108f384919343dfb397582877c81678f8c35
SHA5129c7f21b5dc7ceff338fe4c22ea6ae1e058bdca1b916cb0574338a087799904e9adedeb0686a86f46a6e50fc5bb22c6a67190543295455a7458ff6a1fe5231d77
-
Filesize
16B
MD550a93174f8954084a280023364d839a1
SHA1ae1fc24355dea1fb65839950a3b253ec7c7bbb0b
SHA256702b5f38ec78dd8ac99a8e32df99f31d7196de45df07e06dd0096207bd0149c0
SHA512d847d799b9885ed09a3a9041a3760b44db85ac64767a8e2815c9a15f57da9ce3e93171e23c5b21fd4cc3e956616398969337a1312f20992a3a39321f3cc786f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ty9peokp.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.CashRansomware
Filesize48KB
MD5428ba7a50edbb3a95d7ec7516c962d87
SHA18fb4786ce94232cf47485a0db0db955f3833b3fa
SHA256d618a86101613438a3c42c86f220fb7e915f4a670a42a1c47619539c206e9386
SHA512e369f36fb235fe137d98caacb1aded0df15f664d80a74358cd306d1f080b19d9b8742cdf19c4966194ce2cb572d0c0d55d40d6a0f186df31426dcf60d1170410