Analysis
-
max time kernel
121s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 07:16
Static task
static1
Behavioral task
behavioral1
Sample
5186cafa1e8ce4e242411acc52996aaa.exe
Resource
win7-20240221-en
General
-
Target
5186cafa1e8ce4e242411acc52996aaa.exe
-
Size
6.1MB
-
MD5
5186cafa1e8ce4e242411acc52996aaa
-
SHA1
c14b7773f62bb601e4f910ae595cbc8d1f641c32
-
SHA256
a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a
-
SHA512
a351d17942033364fe8e8e48673c25a1b7988c83432961e35a036d54ab08c9a3b095b5784de9d7442e31f42e41401aaec79b3facd96fcd9a9fa93afd283eb42b
-
SSDEEP
196608:ZwHfJ12mWXFSrOyruZ1e1l+Sc6Z2Fd6GymVVdq:QIFSrOwk0m3a9hMA
Malware Config
Signatures
-
Detect ZGRat V1 4 IoCs
resource yara_rule behavioral1/files/0x002a000000015c3c-9.dat family_zgrat_v1 behavioral1/files/0x0009000000015c87-21.dat family_zgrat_v1 behavioral1/memory/1204-25-0x0000000000DC0000-0x000000000112A000-memory.dmp family_zgrat_v1 behavioral1/memory/1972-82-0x00000000012C0000-0x000000000162A000-memory.dmp family_zgrat_v1 -
Disables Task Manager via registry modification
-
Executes dropped EXE 3 IoCs
pid Process 3016 MoonHack cfg helper.exe 1204 BridgeChainportWebInto.exe 1972 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 cmd.exe 2020 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\migwiz\it-IT\ebf1f9fa8afd6d BridgeChainportWebInto.exe File created C:\Windows\System32\migwiz\it-IT\cmd.exe BridgeChainportWebInto.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Update\Install\{D9005A2B-BC2A-4153-8911-AE3B3F543790}\cmd.exe BridgeChainportWebInto.exe File created C:\Program Files (x86)\Google\Update\Install\{D9005A2B-BC2A-4153-8911-AE3B3F543790}\ebf1f9fa8afd6d BridgeChainportWebInto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1200 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1080 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe 1204 BridgeChainportWebInto.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1204 BridgeChainportWebInto.exe Token: SeDebugPrivilege 1972 cmd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3016 2956 5186cafa1e8ce4e242411acc52996aaa.exe 28 PID 2956 wrote to memory of 3016 2956 5186cafa1e8ce4e242411acc52996aaa.exe 28 PID 2956 wrote to memory of 3016 2956 5186cafa1e8ce4e242411acc52996aaa.exe 28 PID 2956 wrote to memory of 3016 2956 5186cafa1e8ce4e242411acc52996aaa.exe 28 PID 3016 wrote to memory of 2612 3016 MoonHack cfg helper.exe 29 PID 3016 wrote to memory of 2612 3016 MoonHack cfg helper.exe 29 PID 3016 wrote to memory of 2612 3016 MoonHack cfg helper.exe 29 PID 3016 wrote to memory of 2612 3016 MoonHack cfg helper.exe 29 PID 2612 wrote to memory of 2020 2612 WScript.exe 32 PID 2612 wrote to memory of 2020 2612 WScript.exe 32 PID 2612 wrote to memory of 2020 2612 WScript.exe 32 PID 2612 wrote to memory of 2020 2612 WScript.exe 32 PID 2020 wrote to memory of 1200 2020 cmd.exe 34 PID 2020 wrote to memory of 1200 2020 cmd.exe 34 PID 2020 wrote to memory of 1200 2020 cmd.exe 34 PID 2020 wrote to memory of 1200 2020 cmd.exe 34 PID 2020 wrote to memory of 1204 2020 cmd.exe 35 PID 2020 wrote to memory of 1204 2020 cmd.exe 35 PID 2020 wrote to memory of 1204 2020 cmd.exe 35 PID 2020 wrote to memory of 1204 2020 cmd.exe 35 PID 1204 wrote to memory of 948 1204 BridgeChainportWebInto.exe 36 PID 1204 wrote to memory of 948 1204 BridgeChainportWebInto.exe 36 PID 1204 wrote to memory of 948 1204 BridgeChainportWebInto.exe 36 PID 948 wrote to memory of 1652 948 cmd.exe 38 PID 948 wrote to memory of 1652 948 cmd.exe 38 PID 948 wrote to memory of 1652 948 cmd.exe 38 PID 948 wrote to memory of 1080 948 cmd.exe 39 PID 948 wrote to memory of 1080 948 cmd.exe 39 PID 948 wrote to memory of 1080 948 cmd.exe 39 PID 948 wrote to memory of 1972 948 cmd.exe 40 PID 948 wrote to memory of 1972 948 cmd.exe 40 PID 948 wrote to memory of 1972 948 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\5186cafa1e8ce4e242411acc52996aaa.exe"C:\Users\Admin\AppData\Local\Temp\5186cafa1e8ce4e242411acc52996aaa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\MoonHack cfg helper.exe"C:\Users\Admin\AppData\Local\Temp\MoonHack cfg helper.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\componentRuntimehost\qJhC.vbe"3⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\componentRuntimehost\ZSAMlm727VnRbcACh79Hay0D7R9lrDKrBu.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- Modifies registry key
PID:1200
-
-
C:\Users\Admin\AppData\Roaming\componentRuntimehost\BridgeChainportWebInto.exe"C:\Users\Admin\AppData\Roaming\componentRuntimehost/BridgeChainportWebInto.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xlATJQQti8.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:1652
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
PID:1080
-
-
C:\Program Files (x86)\Google\Update\Install\{D9005A2B-BC2A-4153-8911-AE3B3F543790}\cmd.exe"C:\Program Files (x86)\Google\Update\Install\{D9005A2B-BC2A-4153-8911-AE3B3F543790}\cmd.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD52cf0a29383fd0b2054138434eed1b265
SHA184138a0182af9ef5c6b31255bd85707e0ad6a0c3
SHA256e4011f2b2426a6fcb2f48317c8623a9d7583b782b2a4f10caee19f0df70b4185
SHA5123977b288e3512184bed9ead0947f35cb6e3c95c83a517cadd8c63ed642fbb47a41e9ac30c43a0f877ed33bd13a482e082c308081b387e7d339f71c3582da91ca
-
Filesize
219B
MD577b5371367601566dce885d259516d46
SHA133dd2a3b4cd09b7021a7149619e06a97d96ac481
SHA256d9965d1b375b2a949ca4b7ca2cf8821cde57a56e65800003dd2e834b00474c71
SHA5128d43941cadec9e67bbd93554aa9a8d183c0eb6572cdb799c558acbf0b5ff6f01cead2a95ad436a4fe5042be4672d1e79f106c6732a30bf1d2dfe856a5eecc903
-
Filesize
212B
MD5f4846b111f4c8ced35bf1ed60502270f
SHA1625bb8296688ca9cde0c60c60cc17ed83383050c
SHA2562b20a48f281b60176569332a9e56f5aa7911ba9793f87f9729aafc81aab5a6cd
SHA512ef77a850b15f988754eb17c48ce84e15bcf824c4bcc64ac7f5f372f86fee5738de67417fd0cf56271d1701b5256edcf4ad8603b5fab28016af8e28359967df67
-
Filesize
240B
MD5cf441f15daf3339180706cf594e97131
SHA1ca5663745d79bd9196fea24b51d6061f79355d3c
SHA2569a2afde59f2326a4cfbc827e87c7270da20d4a6e19e8d00b5b3a479c26f8ad13
SHA51237d2b08ca78ee06fbcc93577a31a243670fd4efce506449e2e4e3b33c2319081e1f905f8651a642112386620f6551c1a598cdc7f69e682ee252fddc2fa9cde74
-
Filesize
3.4MB
MD551a33d556ce031ad0a5e752f10b00a13
SHA1f05e11e3034481de8590ee4afd912628cacfde9a
SHA256eab0d35dc956885b222e69fde419f3974db712c98bbb23f41325388bde0cc341
SHA512c27a18ebee3e32854e4ad136c3af7de753764a9b44fc024487eb4a197a3f68b506f8578c4beab63e23c64b4e8ce10d63d2987b78175a9691e9aec9fc13887356