Analysis

  • max time kernel
    133s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 14:22

General

  • Target

    AvisoCobranca.exe

  • Size

    66KB

  • MD5

    d64b1432895d8518b29187556c6677d6

  • SHA1

    632e2cc126ad144eef3c3e4b804ba8e2fb67ed40

  • SHA256

    727008de4a36996ce2a59db428c23aee9e95cfeb2226c780f4dfef2e9357da8e

  • SHA512

    59563592bc59d8dfef2afed99333935f9689ebc2c9f04734008f71956056b25bf781513b4ae906ccf5eb0e8c87eaffb5002993b30fe4954a927ed8dc1da3ba4e

  • SSDEEP

    1536:z2kIq3dVrtBtzVHdPyQ6QTJWJ1+7MqmFdaKZWrP/53KxbfniE/5AAyt630:3Iq3dVX6ChrIRnisytw0

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

Processes

  • C:\Users\Admin\AppData\Local\Temp\AvisoCobranca.exe
    "C:\Users\Admin\AppData\Local\Temp\AvisoCobranca.exe"
    1⤵
      PID:4764
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4232 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:3916

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4764-0-0x00007FFCA3103000-0x00007FFCA3105000-memory.dmp

        Filesize

        8KB

      • memory/4764-1-0x00000000008E0000-0x00000000008F6000-memory.dmp

        Filesize

        88KB

      • memory/4764-2-0x000000001BCB0000-0x000000001C4DC000-memory.dmp

        Filesize

        8.2MB

      • memory/4764-3-0x00007FFCA3100000-0x00007FFCA3BC1000-memory.dmp

        Filesize

        10.8MB

      • memory/4764-4-0x000000001DF70000-0x000000001F9FE000-memory.dmp

        Filesize

        26.6MB

      • memory/4764-5-0x00007FFCA3100000-0x00007FFCA3BC1000-memory.dmp

        Filesize

        10.8MB