Analysis
-
max time kernel
42s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
jaser.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
jaser.exe
-
Size
286.0MB
-
MD5
45cf735073402183e3650f69b264323f
-
SHA1
e30987fc42dd931e2fcdc02474b7a8f363e7731b
-
SHA256
afddabb10af9cbd11a940567f1ef2a8d0483fefd47d575cae5e8e615c2f15f5b
-
SHA512
3844fac4876376abb4b3e249ef950b8fc806098a22e857898e61cb26ecad509fdace80685681c515c3b50cd0c14be09b09f71bb68a9f1a6383f73529cd928730
-
SSDEEP
6291456:re35QLVGaqBSYYvfeaQYbAJwD11CuIed8oA46BQ1:A5QLnqBSYYvAixcuIed+bM
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/1260-3-0x000000001B790000-0x000000001B9AE000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-4-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-5-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-7-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-9-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-11-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-17-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-19-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-15-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-13-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-21-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-23-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-55-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-53-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-67-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-65-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-63-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-61-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-59-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-57-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-51-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-49-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-47-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-45-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-43-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-41-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-39-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-37-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-35-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-33-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-31-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-29-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-27-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-25-0x000000001B790000-0x000000001B9A9000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaser = "C:\\Users\\Admin\\AppData\\Roaming\\jaser.exe" jaser.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1260 jaser.exe 1260 jaser.exe 1260 jaser.exe 1260 jaser.exe 1260 jaser.exe 1260 jaser.exe 1260 jaser.exe 1260 jaser.exe 1260 jaser.exe 1260 jaser.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1260 jaser.exe Token: SeDebugPrivilege 1260 jaser.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1612 1260 jaser.exe 28 PID 1260 wrote to memory of 1612 1260 jaser.exe 28 PID 1260 wrote to memory of 1612 1260 jaser.exe 28 PID 1260 wrote to memory of 2132 1260 jaser.exe 29 PID 1260 wrote to memory of 2132 1260 jaser.exe 29 PID 1260 wrote to memory of 2132 1260 jaser.exe 29 PID 1260 wrote to memory of 1268 1260 jaser.exe 30 PID 1260 wrote to memory of 1268 1260 jaser.exe 30 PID 1260 wrote to memory of 1268 1260 jaser.exe 30 PID 1260 wrote to memory of 1864 1260 jaser.exe 31 PID 1260 wrote to memory of 1864 1260 jaser.exe 31 PID 1260 wrote to memory of 1864 1260 jaser.exe 31 PID 1260 wrote to memory of 1496 1260 jaser.exe 32 PID 1260 wrote to memory of 1496 1260 jaser.exe 32 PID 1260 wrote to memory of 1496 1260 jaser.exe 32 PID 1260 wrote to memory of 2336 1260 jaser.exe 33 PID 1260 wrote to memory of 2336 1260 jaser.exe 33 PID 1260 wrote to memory of 2336 1260 jaser.exe 33 PID 1260 wrote to memory of 1620 1260 jaser.exe 34 PID 1260 wrote to memory of 1620 1260 jaser.exe 34 PID 1260 wrote to memory of 1620 1260 jaser.exe 34 PID 1260 wrote to memory of 2740 1260 jaser.exe 35 PID 1260 wrote to memory of 2740 1260 jaser.exe 35 PID 1260 wrote to memory of 2740 1260 jaser.exe 35 PID 1260 wrote to memory of 2996 1260 jaser.exe 36 PID 1260 wrote to memory of 2996 1260 jaser.exe 36 PID 1260 wrote to memory of 2996 1260 jaser.exe 36 PID 1260 wrote to memory of 2108 1260 jaser.exe 37 PID 1260 wrote to memory of 2108 1260 jaser.exe 37 PID 1260 wrote to memory of 2108 1260 jaser.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\jaser.exe"C:\Users\Admin\AppData\Local\Temp\jaser.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1612
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1268
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1864
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1496
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2336
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2740
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2996
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:2108
-