Analysis

  • max time kernel
    192s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 22:52

General

  • Target

    OverWolf Crypter.zip

  • Size

    36.5MB

  • MD5

    a116a6efbffd9b698bdf8774332ac8f1

  • SHA1

    33d11b996329060d35d758e10389beb69567685e

  • SHA256

    0e98adba7adbbcb6071be545eeb269fec2bff9300cd8bd48c91f076ae5103dae

  • SHA512

    001ecae34b7d337479d0ec780abd3f3dcd6171ea2df23d195d40969cb0f740af0a6022c43e015360e38a2e8e51264b19548d22376c1e5a5cb273604611b5fbb9

  • SSDEEP

    786432:AqQEiVcxNIl1uw0tHyQ+X+eFPL3M0Tr1SEyFyLx7I:A3EbHmQ+O67MMrAE6yLx7I

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 57 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\OverWolf Crypter.zip"
    1⤵
      PID:1932
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1956
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:1972
        • C:\Users\Admin\Desktop\OverWolf Crypter\OverWolf Crypter 1.1.exe
          "C:\Users\Admin\Desktop\OverWolf Crypter\OverWolf Crypter 1.1.exe"
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2312
          • C:\Users\Admin\Desktop\OverWolf Crypter\ILMerge.exe
            "C:\Users\Admin\Desktop\OverWolf Crypter\ILMerge.exe"
            2⤵
              PID:4752
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /4
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2864

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\53b4dde3-ceef-4149-b63d-4b67cc36c3e9\GunaDotNetRT.dll

            Filesize

            136KB

            MD5

            9af5eb006bb0bab7f226272d82c896c7

            SHA1

            c2a5bb42a5f08f4dc821be374b700652262308f0

            SHA256

            77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db

            SHA512

            7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a

          • memory/2312-46-0x0000000007DB0000-0x0000000007E06000-memory.dmp

            Filesize

            344KB

          • memory/2312-67-0x000000000DCB0000-0x000000000DE36000-memory.dmp

            Filesize

            1.5MB

          • memory/2312-4-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-72-0x0000000071780000-0x00000000717B7000-memory.dmp

            Filesize

            220KB

          • memory/2312-6-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-7-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-8-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-9-0x0000000000360000-0x0000000002F76000-memory.dmp

            Filesize

            44.1MB

          • memory/2312-10-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-12-0x0000000076470000-0x0000000076471000-memory.dmp

            Filesize

            4KB

          • memory/2312-13-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-16-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-18-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-20-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-21-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-22-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-24-0x0000000000360000-0x0000000002F76000-memory.dmp

            Filesize

            44.1MB

          • memory/2312-65-0x000000000A400000-0x000000000A426000-memory.dmp

            Filesize

            152KB

          • memory/2312-27-0x00000000079B0000-0x0000000007A4C000-memory.dmp

            Filesize

            624KB

          • memory/2312-28-0x0000000008000000-0x00000000085A4000-memory.dmp

            Filesize

            5.6MB

          • memory/2312-64-0x000000000A350000-0x000000000A35A000-memory.dmp

            Filesize

            40KB

          • memory/2312-63-0x000000000C2A0000-0x000000000C302000-memory.dmp

            Filesize

            392KB

          • memory/2312-5-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-2-0x0000000076450000-0x0000000076540000-memory.dmp

            Filesize

            960KB

          • memory/2312-25-0x0000000000360000-0x0000000002F76000-memory.dmp

            Filesize

            44.1MB

          • memory/2312-62-0x000000000C210000-0x000000000C222000-memory.dmp

            Filesize

            72KB

          • memory/2312-61-0x0000000009B30000-0x0000000009B96000-memory.dmp

            Filesize

            408KB

          • memory/2312-60-0x000000000A1E0000-0x000000000A2FA000-memory.dmp

            Filesize

            1.1MB

          • memory/2312-58-0x0000000073BF0000-0x0000000073C79000-memory.dmp

            Filesize

            548KB

          • memory/2312-55-0x0000000071780000-0x00000000717B7000-memory.dmp

            Filesize

            220KB

          • memory/2312-44-0x0000000007A50000-0x0000000007AE2000-memory.dmp

            Filesize

            584KB

          • memory/2312-45-0x0000000007D40000-0x0000000007D4A000-memory.dmp

            Filesize

            40KB

          • memory/2312-0-0x0000000000360000-0x0000000002F76000-memory.dmp

            Filesize

            44.1MB

          • memory/2312-48-0x0000000008800000-0x0000000008A4C000-memory.dmp

            Filesize

            2.3MB

          • memory/2312-1-0x0000000076470000-0x0000000076471000-memory.dmp

            Filesize

            4KB

          • memory/2864-35-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-36-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-37-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-38-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-39-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-30-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-31-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-40-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-41-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB

          • memory/2864-29-0x00000225F7900000-0x00000225F7901000-memory.dmp

            Filesize

            4KB