Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 08:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
İlerleme ödemesi.exe
Resource
win7-20240215-en
3 signatures
150 seconds
General
-
Target
İlerleme ödemesi.exe
-
Size
2.7MB
-
MD5
efcccf8b63bd72b3209404be33f078b1
-
SHA1
efcb5f894df34358f405c25d26f1b47310240036
-
SHA256
a4c3950a8b5fd9da3ad8daec90dec0e9a606cec100a58bfe4538cb28b0f4d872
-
SHA512
e7cef4e216a56ceb103834a9b434a2641a30052f08512c9372240d314bf772de792bdc910d8e82e1305c4da3733569203f45d09209a0bd53e804e3f838e78d0f
-
SSDEEP
49152:92Iy94piBjSAsZqLv2PomrfMzd8goYD5P7Wdk6kL1PjKS6vNJF:+90iBjSBELv2AqfMugoYlidk6q1rKV
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/2232-4-0x0000000006F40000-0x0000000007172000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-16-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-42-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-48-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-46-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-44-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-40-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-38-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-36-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-34-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-32-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-30-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-28-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-26-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-24-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-22-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-20-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-18-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-14-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-12-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-10-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-8-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-7-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-56-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-70-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-68-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-66-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-64-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-62-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-60-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-58-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-54-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-52-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 behavioral2/memory/2232-50-0x0000000006F40000-0x000000000716C000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2232 İlerleme ödemesi.exe Token: SeDebugPrivilege 2232 İlerleme ödemesi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe"C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3416,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:81⤵PID:4652