Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 01:39

General

  • Target

    Dhl.exe

  • Size

    216KB

  • MD5

    35d15d8d64bf7e1f434106b50ae925ce

  • SHA1

    b0a43deb88658d2960acb63106bcc6c4e6c3740c

  • SHA256

    e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62

  • SHA512

    7bd55bc3cedea3ce5adbee8ab424f291136c128d4134646e9794221b0e52effe03fe695bb4523499a9e947593145977d3cb454f184046e3814a21f83b288705a

  • SSDEEP

    6144:9Akztmr9r/EDpppppppppppppppppppppppppppppb3:f5mr9r/+pppppppppppppppppppppppv

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
    "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
      "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
      2⤵
        PID:212
      • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
        "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
        2⤵
          PID:4580
        • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
          "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
          2⤵
            PID:5052
          • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
            "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
            2⤵
              PID:756
            • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
              "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
              2⤵
                PID:1392
              • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
                "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
                2⤵
                  PID:3472
                • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
                  "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
                  2⤵
                    PID:1500
                  • C:\Users\Admin\AppData\Local\Temp\Dhl.exe
                    "C:\Users\Admin\AppData\Local\Temp\Dhl.exe"
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4440
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4396,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=4348 /prefetch:8
                  1⤵
                    PID:636

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Dhl.exe.log

                    Filesize

                    1KB

                    MD5

                    159a40ccfd419bd60a20a1c278edaafd

                    SHA1

                    09bc35e46135b6b44c609fe6514ab7e2c8696a99

                    SHA256

                    24487f4b6318683dcd81970e9f57fb45167575f687f7831a563176e20da657b6

                    SHA512

                    b5c5b8c23479afff6b72c37c2cc1204c079ae003bae586d082d2b05acfdab8753fea78c5e53f692e4a45aba6746703d9ca99a2d0fa7bd88a7f35a910d1ad1ff3

                  • C:\Users\Admin\AppData\Local\Temp\Wkdlsd.tmpdb

                    Filesize

                    152KB

                    MD5

                    73bd1e15afb04648c24593e8ba13e983

                    SHA1

                    4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91

                    SHA256

                    aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b

                    SHA512

                    6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

                  • memory/4060-0-0x0000025678CA0000-0x0000025678CDC000-memory.dmp

                    Filesize

                    240KB

                  • memory/4060-1-0x00007FF9902C3000-0x00007FF9902C5000-memory.dmp

                    Filesize

                    8KB

                  • memory/4060-2-0x00007FF9902C0000-0x00007FF990D81000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4060-3-0x00007FF9902C3000-0x00007FF9902C5000-memory.dmp

                    Filesize

                    8KB

                  • memory/4060-4-0x00007FF9902C0000-0x00007FF990D81000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4060-5-0x000002567B4C0000-0x000002567B7B4000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/4060-9-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-6-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-11-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-23-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-33-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-31-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-29-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-27-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-25-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-21-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-19-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-17-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-15-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-13-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-7-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-41-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-37-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-49-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-55-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-61-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-59-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-57-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-53-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-51-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-47-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-45-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-43-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-35-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-39-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-67-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-65-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-69-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-63-0x000002567B4C0000-0x000002567B7AE000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4060-4886-0x00007FF9902C0000-0x00007FF990D81000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4060-4887-0x000002567C860000-0x000002567C990000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/4060-4888-0x000002567AAE0000-0x000002567AB2C000-memory.dmp

                    Filesize

                    304KB

                  • memory/4060-4889-0x000002567AB30000-0x000002567AB84000-memory.dmp

                    Filesize

                    336KB

                  • memory/4060-4898-0x00007FF9902C0000-0x00007FF990D81000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4440-4896-0x0000028524CD0000-0x0000028524DE6000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/4440-4897-0x00007FF9902C0000-0x00007FF990D81000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4440-4899-0x00007FF9902C0000-0x00007FF990D81000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4440-7200-0x000002850AC00000-0x000002850AC08000-memory.dmp

                    Filesize

                    32KB

                  • memory/4440-7201-0x0000028524EE0000-0x0000028524F7E000-memory.dmp

                    Filesize

                    632KB

                  • memory/4440-7202-0x000002850C490000-0x000002850C4BC000-memory.dmp

                    Filesize

                    176KB

                  • memory/4440-7203-0x00000285261F0000-0x000002852626A000-memory.dmp

                    Filesize

                    488KB

                  • memory/4440-7233-0x00007FF9902C0000-0x00007FF990D81000-memory.dmp

                    Filesize

                    10.8MB