Malware Analysis Report

2024-11-13 16:30

Sample ID 240510-ker11agb67
Target İlerleme ödemesi.exe
SHA256 a4c3950a8b5fd9da3ad8daec90dec0e9a606cec100a58bfe4538cb28b0f4d872
Tags
zgrat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a4c3950a8b5fd9da3ad8daec90dec0e9a606cec100a58bfe4538cb28b0f4d872

Threat Level: Known bad

The file İlerleme ödemesi.exe was found to be: Known bad.

Malicious Activity Summary

zgrat rat

Detect ZGRat V1

ZGRat

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-10 08:31

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 08:31

Reported

2024-05-10 08:33

Platform

win7-20240215-en

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe

"C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe"

Network

N/A

Files

memory/2404-0-0x00000000741AE000-0x00000000741AF000-memory.dmp

memory/2404-1-0x0000000000B30000-0x0000000000DEE000-memory.dmp

memory/2404-2-0x00000000741A0000-0x000000007488E000-memory.dmp

memory/2404-3-0x00000000056D0000-0x0000000005B2C000-memory.dmp

memory/2404-4-0x0000000007D90000-0x0000000007FC2000-memory.dmp

memory/2404-12-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-5-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-30-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-6-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-40-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-46-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-8-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-14-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-52-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-50-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-48-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-44-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-42-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-38-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-36-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-34-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-32-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-28-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-62-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-26-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-24-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-22-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-20-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-18-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-54-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-16-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-10-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-56-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-58-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-60-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-64-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-68-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-66-0x0000000007D90000-0x0000000007FBC000-memory.dmp

memory/2404-4885-0x00000000741A0000-0x000000007488E000-memory.dmp

memory/2404-4887-0x00000000009A0000-0x00000000009EC000-memory.dmp

memory/2404-4886-0x0000000000870000-0x00000000008DC000-memory.dmp

memory/2404-4888-0x0000000000AE0000-0x0000000000B34000-memory.dmp

memory/2404-4889-0x00000000741A0000-0x000000007488E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-10 08:31

Reported

2024-05-10 08:33

Platform

win10v2004-20240508-en

Max time kernel

125s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe

"C:\Users\Admin\AppData\Local\Temp\İlerleme ödemesi.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3416,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
NL 23.62.61.73:443 www.bing.com tcp
US 8.8.8.8:53 73.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 142.53.16.96.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp

Files

memory/2232-0-0x000000007519E000-0x000000007519F000-memory.dmp

memory/2232-1-0x0000000000410000-0x00000000006CE000-memory.dmp

memory/2232-2-0x0000000075190000-0x0000000075940000-memory.dmp

memory/2232-3-0x00000000058B0000-0x0000000005D0C000-memory.dmp

memory/2232-4-0x0000000006F40000-0x0000000007172000-memory.dmp

memory/2232-5-0x0000000007720000-0x0000000007CC4000-memory.dmp

memory/2232-6-0x0000000007210000-0x00000000072A2000-memory.dmp

memory/2232-16-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-42-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-48-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-46-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-44-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-40-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-38-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-36-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-34-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-32-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-30-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-28-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-26-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-24-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-22-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-20-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-18-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-14-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-12-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-10-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-8-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-7-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-56-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-70-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-68-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-66-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-64-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-62-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-60-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-58-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-54-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-52-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-50-0x0000000006F40000-0x000000000716C000-memory.dmp

memory/2232-4887-0x0000000075190000-0x0000000075940000-memory.dmp

memory/2232-4888-0x0000000007320000-0x000000000738C000-memory.dmp

memory/2232-4889-0x0000000005670000-0x00000000056BC000-memory.dmp

memory/2232-4890-0x00000000057A0000-0x00000000057F4000-memory.dmp

memory/2232-4892-0x0000000075190000-0x0000000075940000-memory.dmp