Resubmissions

12-05-2024 18:26

240512-w3ftesdb55 10

12-05-2024 01:57

240512-cc9t2aea99 10

Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 01:57

General

  • Target

    Nvidia.exe

  • Size

    2.6MB

  • MD5

    87610f8f3d48edf25d48c4c0ba2b3486

  • SHA1

    ab7498abd8626c968c84167ef1c1c503faace1fe

  • SHA256

    e387c084d5c3b62413743e912ee10776564e7c55ba1dc801990b312b88b61efe

  • SHA512

    73840a477b360fb1ab2061087838618a748f8b24560d289d563b4ba4b1b905f62686f4bca2c2e236007be1bc5931711c0d162b1c0f3ade009861e004116ddfe1

  • SSDEEP

    49152:O+8l/s9Yf5u4uT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9u65:OtVsGobzsG1tQRjdih8rwcV5

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nvidia.exe
    "C:\Users\Admin\AppData\Local\Temp\Nvidia.exe"
    1⤵
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2364
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\CURRENT.CashRansomware

    Filesize

    32B

    MD5

    a18e7332103a87c7ade2b96708c827c6

    SHA1

    3997e7161898c629347527dd79ea092e743a84a7

    SHA256

    46ba2581908fac1ae76cb24e4b8ddf9a27f2782df1f859d47c1b14898da5ce0d

    SHA512

    af3fa65e20d289ed9ef20bdf8efc7f244d24a607c1a2fb777d113b495cf979f6b9e96b48187ecb70ee250d70028043631998879e970ff3aa45beb0017ed3b04a

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_2.CashRansomware

    Filesize

    8KB

    MD5

    4a780d34938c72aa035b78af5b46eadf

    SHA1

    3115fcdf0a0baeef125e1fe6876057ea9dacf81c

    SHA256

    817a4a787c37842f652f5b1ce5c0240ec829e8ecc8c466d3cfab576ae9d44c72

    SHA512

    92d53c7ee93174dbb39cd1612de035ca9326c34aa47474d3c847142d6a7825a07262e16c07eabc2e0edb77bf1ecf7ebc56176ef94e084ca21d6a1436e652a5ae

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NNULH633\desktop.ini.CashRansomware

    Filesize

    80B

    MD5

    85ee54f56952719aa2571500d58be8ed

    SHA1

    c886fbb76489516449684991f1179aa12a121db2

    SHA256

    8e9a90060226e129d819dac9c3f5db9d2338c3a6ce8f2648fd90808e014a37b0

    SHA512

    96ce0f519127b1745571c7e453e6592372df8f9efb2c116f00ef4d7896d7228910a5238576e18c0b480cd410c48a88a9a78f4a93e9a7bf4f4e9e8481da6be522

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds\Microsoft Feeds~\MSNBC News~.feed-ms.CashRansomware

    Filesize

    28KB

    MD5

    623da5a02008e1872be4b6f32c32d07e

    SHA1

    88be488199ad93350738c16b3bf87d064a142289

    SHA256

    41c31e28e069590669e576b54f314c98d4f99c1721f21b75d01cf5af8c318a3e

    SHA512

    7d89f4ebdaf40b1fb3086d835dc0b23af82a4334bd7dcd720270a2fb1bf352d761852b2cefd9ffc4f81a11bdf9b7867615ff75df0912058ad9c8a141c01f4da4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\container.dat.CashRansomware

    Filesize

    16B

    MD5

    393f8beb577d6a102003ee2692fbcbb4

    SHA1

    fef1c8d87723cf77c1821006a5f6a39727a521b7

    SHA256

    14295d2da68024c320cf8cdafa6b3243f60786a44106e7f5a602946468e3ac1a

    SHA512

    9fc6e51a65c7339263eb7d87bf42598f994214bcec20cc230bc4974cbfb9ff6e6b053511ea04bfa61faa490ec20c07613bd3ef3b58c919a6bf92441d1202f16c

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xkoyglns.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.CashRansomware

    Filesize

    48KB

    MD5

    a2a663372c95edf26c089d7410087e78

    SHA1

    dff8c2ba2fc44bb231f1088fa05d40ca9bca7b4b

    SHA256

    8355a4a06bc84b5eb1cc5b90c4ea63f3f129b0769827aba3752365c3e5dab892

    SHA512

    2164bad7c8d4ba0c672c9359232dd0dca17404385ea8650fdc1eba5e77f33a12348c6300dbcba80f5b6bd9c3b3cd11b63f318df31806aab6a6c8a8fe6fef52ab

  • memory/2364-0-0x000007FEF5763000-0x000007FEF5764000-memory.dmp

    Filesize

    4KB

  • memory/2364-2-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

    Filesize

    9.9MB

  • memory/2364-1-0x0000000000990000-0x0000000000C34000-memory.dmp

    Filesize

    2.6MB

  • memory/2364-1199-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

    Filesize

    9.9MB

  • memory/2364-1200-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

    Filesize

    9.9MB

  • memory/2364-1201-0x000007FEF5763000-0x000007FEF5764000-memory.dmp

    Filesize

    4KB

  • memory/2364-1202-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

    Filesize

    9.9MB

  • memory/2364-1203-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

    Filesize

    9.9MB

  • memory/2364-1204-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

    Filesize

    9.9MB