Analysis
-
max time kernel
144s -
max time network
201s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-05-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
jaser.exe
Resource
win11-20240419-en
windows11-21h2-x64
8 signatures
150 seconds
General
-
Target
jaser.exe
-
Size
286.0MB
-
MD5
45cf735073402183e3650f69b264323f
-
SHA1
e30987fc42dd931e2fcdc02474b7a8f363e7731b
-
SHA256
afddabb10af9cbd11a940567f1ef2a8d0483fefd47d575cae5e8e615c2f15f5b
-
SHA512
3844fac4876376abb4b3e249ef950b8fc806098a22e857898e61cb26ecad509fdace80685681c515c3b50cd0c14be09b09f71bb68a9f1a6383f73529cd928730
-
SSDEEP
6291456:re35QLVGaqBSYYvfeaQYbAJwD11CuIed8oA46BQ1:A5QLnqBSYYvAixcuIed+bM
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/4704-3-0x000001E021B60000-0x000001E021D7E000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-4-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-9-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-31-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-45-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-37-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-33-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-29-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-27-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-25-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-23-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-21-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-19-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-17-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-13-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-7-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-5-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-15-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-11-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-53-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-51-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-49-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-67-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-65-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-63-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-61-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-59-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-57-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-55-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-47-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-43-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-41-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-39-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 behavioral1/memory/4704-35-0x000001E021B60000-0x000001E021D79000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaser = "C:\\Users\\Admin\\AppData\\Roaming\\jaser.exe" jaser.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4704 set thread context of 3084 4704 jaser.exe 87 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3084 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4704 jaser.exe Token: SeDebugPrivilege 4704 jaser.exe Token: SeDebugPrivilege 3084 InstallUtil.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3084 4704 jaser.exe 87 PID 4704 wrote to memory of 3084 4704 jaser.exe 87 PID 4704 wrote to memory of 3084 4704 jaser.exe 87 PID 4704 wrote to memory of 3084 4704 jaser.exe 87 PID 4704 wrote to memory of 3084 4704 jaser.exe 87 PID 4704 wrote to memory of 3084 4704 jaser.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\jaser.exe"C:\Users\Admin\AppData\Local\Temp\jaser.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4776
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:752
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:2872