Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 08:31

General

  • Target

    42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

  • Size

    6.1MB

  • MD5

    d9a34070f5445a2f4c1fa7dcb45e0ab4

  • SHA1

    f6c56df6c755f1c0b45448690465a5e2e06275ce

  • SHA256

    42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1

  • SHA512

    5429daadd697fff888727238d725ff86f8d1ea3e7f29e7faa0a5bbb3f2966ff126d9f7c83b64ac63e3e9d93d69983d21032b64cd280215d28d15d818d55e516c

  • SSDEEP

    24576:OudIAccuoodT1Exb/4rNYRxJ3//XAO81DnemJnwRS64uvRdT7dk9pagnJr8gMEyR:b

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
    "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
      "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
      2⤵
        PID:2492
      • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
        "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
        2⤵
          PID:2952
        • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
          "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
          2⤵
            PID:1744
          • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
            "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
            2⤵
              PID:1932
            • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
              "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
              2⤵
                PID:1768
              • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
                "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
                2⤵
                  PID:1696
                • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
                  "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
                  2⤵
                    PID:1028
                  • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
                    "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
                    2⤵
                      PID:2688
                    • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
                      "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
                      2⤵
                        PID:492
                      • C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
                        "C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"
                        2⤵
                        • Accesses Microsoft Outlook profiles
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        • outlook_office_path
                        • outlook_win_path
                        PID:360
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1' -Value '"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"' -PropertyType 'String'
                          3⤵
                          • Adds Run key to start application
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4928

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\Hdvye.tmpdb

                      Filesize

                      148KB

                      MD5

                      90a1d4b55edf36fa8b4cc6974ed7d4c4

                      SHA1

                      aba1b8d0e05421e7df5982899f626211c3c4b5c1

                      SHA256

                      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                      SHA512

                      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                    • memory/360-4905-0x000000001B3D0000-0x000000001B4E6000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/360-7227-0x000007FEF5790000-0x000007FEF617C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/360-7226-0x000007FEF5790000-0x000007FEF617C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/360-7225-0x0000000000600000-0x000000000069E000-memory.dmp

                      Filesize

                      632KB

                    • memory/360-7224-0x00000000003A0000-0x00000000003A8000-memory.dmp

                      Filesize

                      32KB

                    • memory/360-7267-0x000007FEF5790000-0x000007FEF617C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/360-7229-0x0000000000CF0000-0x0000000000D6A000-memory.dmp

                      Filesize

                      488KB

                    • memory/360-7228-0x0000000000450000-0x000000000047C000-memory.dmp

                      Filesize

                      176KB

                    • memory/2208-66-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-54-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-8-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-10-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-12-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-28-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-34-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-38-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-40-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-42-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-49-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-14-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-16-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-18-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-20-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-4-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-64-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-62-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-60-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-58-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-56-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-6-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-52-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-50-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-46-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-4884-0x0000000000500000-0x000000000054C000-memory.dmp

                      Filesize

                      304KB

                    • memory/2208-4883-0x000000001B440000-0x000000001B570000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2208-44-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-36-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-32-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-30-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-3-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-2-0x000000001B920000-0x000000001BC16000-memory.dmp

                      Filesize

                      3.0MB

                    • memory/2208-1-0x0000000000FE0000-0x00000000015FA000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/2208-26-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-24-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-22-0x000000001B920000-0x000000001BC0F000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2208-4885-0x000007FEF5793000-0x000007FEF5794000-memory.dmp

                      Filesize

                      4KB

                    • memory/2208-4886-0x0000000000AA0000-0x0000000000AF4000-memory.dmp

                      Filesize

                      336KB

                    • memory/2208-0-0x000007FEF5793000-0x000007FEF5794000-memory.dmp

                      Filesize

                      4KB

                    • memory/4928-7266-0x0000000001C80000-0x0000000001C88000-memory.dmp

                      Filesize

                      32KB

                    • memory/4928-7265-0x000000001B560000-0x000000001B842000-memory.dmp

                      Filesize

                      2.9MB