Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe
Resource
win10v2004-20240508-en
General
-
Target
ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe
-
Size
382KB
-
MD5
d53e181c12299c4011d0073b9af8cee2
-
SHA1
b6e03d6b6a2955e25cd61730820b88c57628bcf7
-
SHA256
ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb
-
SHA512
62cfe628434da28ca09c53b829200b6d37ed57279efefd34a6e28614466c159d608326a1635d403c65fd3ae0e6ee69a378f429e115e63c6625aa52462097a4b1
-
SSDEEP
6144:L0NTKE3CDWHhQgoFZHaJtrzQr792AiXQvdUodm7iKMceJK2o:L0NGMCaXoFdAFzQrJviXq3w7IJK2o
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/4584-79-0x0000018A1B490000-0x0000018A1ECC4000-memory.dmp family_zgrat_v1 behavioral1/memory/4584-80-0x0000018A3A440000-0x0000018A3A54A000-memory.dmp family_zgrat_v1 behavioral1/memory/4584-84-0x0000018A3A020000-0x0000018A3A044000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation u26o.0.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation u26o.1.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe -
Executes dropped EXE 2 IoCs
pid Process 4788 u26o.0.exe 2556 u26o.1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4424 2832 WerFault.exe 80 3128 4788 WerFault.exe 83 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u26o.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u26o.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u26o.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u26o.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u26o.0.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2084 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4788 u26o.0.exe 4788 u26o.0.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4584 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe 2556 u26o.1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2832 wrote to memory of 4788 2832 ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe 83 PID 2832 wrote to memory of 4788 2832 ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe 83 PID 2832 wrote to memory of 4788 2832 ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe 83 PID 2832 wrote to memory of 2556 2832 ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe 85 PID 2832 wrote to memory of 2556 2832 ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe 85 PID 2832 wrote to memory of 2556 2832 ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe 85 PID 4788 wrote to memory of 4060 4788 u26o.0.exe 90 PID 4788 wrote to memory of 4060 4788 u26o.0.exe 90 PID 4788 wrote to memory of 4060 4788 u26o.0.exe 90 PID 4060 wrote to memory of 2084 4060 cmd.exe 94 PID 4060 wrote to memory of 2084 4060 cmd.exe 94 PID 4060 wrote to memory of 2084 4060 cmd.exe 94 PID 2556 wrote to memory of 4584 2556 u26o.1.exe 95 PID 2556 wrote to memory of 4584 2556 u26o.1.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe"C:\Users\Admin\AppData\Local\Temp\ad11f5e7b6814512829785896c370416c0f7ce733674c2491cb7ac0dd4dce5cb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\u26o.0.exe"C:\Users\Admin\AppData\Local\Temp\u26o.0.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\u26o.0.exe" & del "C:\ProgramData\*.dll"" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:2084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 14203⤵
- Program crash
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\u26o.1.exe"C:\Users\Admin\AppData\Local\Temp\u26o.1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 12202⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2832 -ip 28321⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4788 -ip 47881⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a1d6c5deaa9d2a181abb819bf3f2581c
SHA112e1b2a7642660a19da15194d0ce7d1e3bcfccec
SHA256c614598f33337db386e220aa02ce580ee054844a556bb1f3034f83e6cfe91f18
SHA51200c91ecb1cc2307d0d1ca2e4eece4c2b22c3ad30f3c8e9931748486b775271e4c6df2e9b9393e96bdd72a2a15999911400db1d3f45a52221259a04a62cd76500
-
Filesize
240KB
MD5a5a396650cc1831759ee447062d4593a
SHA137bd8f9b348b16378ea9023489243b8725addf82
SHA256a1f50375231c83613bd18aee62fdeccb52c06445d1eebf5fc7293246746f24a5
SHA512a3063b2168164df6fd19cec76c7f07f30c4dae3fa5c00b7efb9c3005edbf564705701adbba575280373c916cf31e6450b246d6046de5ca384897d2751ffc2d4c
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954