Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-05-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe
Resource
win10v2004-20240508-en
General
-
Target
9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe
-
Size
382KB
-
MD5
d3b03da8cc7dcf4d1382156cb005a36e
-
SHA1
b9a8fd0151345adadd318b688295e267a55284ab
-
SHA256
9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8
-
SHA512
64733d56c806a3b94b569eeb12fc709477f87b0c75a1255d1c559dc7495642f4a365615e40275d50d861b7c8c7ab180c0173ab5eedbd9709fb43a56d5e1e1a53
-
SSDEEP
6144:L0NTKE3CDWHhQgoFZHaJtrzQr792AiXQvdUodm7iKMceJK2q:L0NGMCaXoFdAFzQrJviXq3w7IJK2q
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/2512-79-0x0000023FC5BF0000-0x0000023FC9424000-memory.dmp family_zgrat_v1 behavioral2/memory/2512-80-0x0000023FE3D90000-0x0000023FE3E9A000-memory.dmp family_zgrat_v1 behavioral2/memory/2512-84-0x0000023FE3A70000-0x0000023FE3A94000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4072 u2q0.0.exe 3020 u2q0.1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 132 3528 WerFault.exe 78 4580 4072 WerFault.exe 81 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2q0.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2q0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2q0.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u2q0.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u2q0.0.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3720 timeout.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4072 u2q0.0.exe 4072 u2q0.0.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2512 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe 3020 u2q0.1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3528 wrote to memory of 4072 3528 9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe 81 PID 3528 wrote to memory of 4072 3528 9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe 81 PID 3528 wrote to memory of 4072 3528 9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe 81 PID 3528 wrote to memory of 3020 3528 9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe 84 PID 3528 wrote to memory of 3020 3528 9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe 84 PID 3528 wrote to memory of 3020 3528 9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe 84 PID 3020 wrote to memory of 2512 3020 u2q0.1.exe 89 PID 3020 wrote to memory of 2512 3020 u2q0.1.exe 89 PID 4072 wrote to memory of 1136 4072 u2q0.0.exe 91 PID 4072 wrote to memory of 1136 4072 u2q0.0.exe 91 PID 4072 wrote to memory of 1136 4072 u2q0.0.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe"C:\Users\Admin\AppData\Local\Temp\9742004629e0fd88ab25a197674ff01f6553feb8781adc7549f2b16a3eb704d8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\u2q0.0.exe"C:\Users\Admin\AppData\Local\Temp\u2q0.0.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\u2q0.0.exe" & del "C:\ProgramData\*.dll"" & exit3⤵PID:1136
-
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:3720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 13763⤵
- Program crash
PID:4580
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2q0.1.exe"C:\Users\Admin\AppData\Local\Temp\u2q0.1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 9762⤵
- Program crash
PID:132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3528 -ip 35281⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4072 -ip 40721⤵PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5efd4749f278f0c163488836a41d09174
SHA166a994902b80e18c11c72ebdf3a3ff2560401889
SHA256985df158b218abc6d39ea11b2951db5e80d67690f90ad0d0d60d25238663189a
SHA512ec68d236613425a26edcdd10836929acdce59e45ab4c8fde2325f484fe08cb10c4107a0fe4100924f227a9f42aaabd2dcff89582ee37d993fbbe10a6bae62646
-
Filesize
240KB
MD5a5a396650cc1831759ee447062d4593a
SHA137bd8f9b348b16378ea9023489243b8725addf82
SHA256a1f50375231c83613bd18aee62fdeccb52c06445d1eebf5fc7293246746f24a5
SHA512a3063b2168164df6fd19cec76c7f07f30c4dae3fa5c00b7efb9c3005edbf564705701adbba575280373c916cf31e6450b246d6046de5ca384897d2751ffc2d4c
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954