Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 14:19

General

  • Target

    a036a9b545279b459cdecc58373e87c881683548c000c0aaa58ed552a1c10e0c.exe

  • Size

    2.1MB

  • MD5

    d86ddf1a6b51159906020e5efbe1ba92

  • SHA1

    4cae49c47e8bd1a0a945ab076bfbe2917ccc64b4

  • SHA256

    a036a9b545279b459cdecc58373e87c881683548c000c0aaa58ed552a1c10e0c

  • SHA512

    09db2385b34eca95a23cc19ce58a8945705662bfc817f836437bbe260986ea507fa0739da90f9c18d16c3cdf08f33a32bb8332fc11084f5f10df90f74ba9de21

  • SSDEEP

    24576:2TbBv5rUyXVYnL4FjYmL0J1HlbR6a2BbVgnTQcj+7nanx3GWFQjCDl5E85qcMeL9:IBJYEFbLbMnTQZanxSjC3v5+jml

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a036a9b545279b459cdecc58373e87c881683548c000c0aaa58ed552a1c10e0c.exe
    "C:\Users\Admin\AppData\Local\Temp\a036a9b545279b459cdecc58373e87c881683548c000c0aaa58ed552a1c10e0c.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\SavesMonitor\RmK92.vbe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\SavesMonitor\CXb1cErhNTIpSAGADF.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3972
        • C:\SavesMonitor\Blockcontainerproviderdhcp.exe
          "C:\SavesMonitor/Blockcontainerproviderdhcp.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2228
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1Q9JgJ9CBv.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1112
            • C:\Windows\system32\chcp.com
              chcp 65001
              6⤵
                PID:4952
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                6⤵
                • Runs ping.exe
                PID:3888
              • C:\SavesMonitor\SppExtComObj.exe
                "C:\SavesMonitor\SppExtComObj.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:1040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\SavesMonitor\Blockcontainerproviderdhcp.exe

      Filesize

      1.8MB

      MD5

      6c43270f19233761545141a2175d00bc

      SHA1

      2af739400dd238badc0b7e9ce3d45e1eb0023e48

      SHA256

      27b5ff20a635463564a1b19868af62916c29453654d703aee7482b391b554de4

      SHA512

      b43a8964c58fb933a80bcdd8b688d8ffda33a832e831ae8c2b54323908c5fe7c87953f24836ee987802d9429f1cd313947d3df988a90817f651edcf89c6586d6

    • C:\SavesMonitor\CXb1cErhNTIpSAGADF.bat

      Filesize

      92B

      MD5

      a65e78a870380ac9c4ba083569959d4a

      SHA1

      8d6c9d55106b4ac275b873db16c069a27b79609f

      SHA256

      d82e913f336059d8b7e9adf0832357d82b746230c75a997613b00714e86ddf30

      SHA512

      9021e5dc54bff72ccb2b62d6c13f44dbb90c04f4b88513bbee04b559290bf93f149cdfb574cc8ce6d645237e9f7effb0b5e267d33db1d0ecafe2da7a159e2b44

    • C:\SavesMonitor\RmK92.vbe

      Filesize

      208B

      MD5

      252c8a936c61108036239630f110d0b9

      SHA1

      765fa5076b12b640ab968cc5279b540e9f161341

      SHA256

      d16aa2383787258cc998e0f6a1d48f62ceb3c11068355c2eed26cdd74dc97b34

      SHA512

      d333fa3186c904c52b5685bb3e9197f25a0a4980955d973e1e99a84433821ebf5dcdb1faad21e5554eea940bd219fb92cf92e77e6be72d187692ae22e3856de5

    • C:\Users\Admin\AppData\Local\Temp\1Q9JgJ9CBv.bat

      Filesize

      160B

      MD5

      78e8d8483edcb645701131335f100554

      SHA1

      8c5e77e81f3a65f1ce55d25d1b80a49285c98933

      SHA256

      77f12cf6b352b01447e8cc17cd25853030c8fe52e00daa3df3d9f629b8b4424f

      SHA512

      9713875b85f80efb1c2f1d2d04db55c4d5a8d4cdea22f3784d14aaff158d6e09814998ebdafcd9e8a3fbc12356f014ca503f44b0dac41947a1638a2829745b08

    • memory/1040-47-0x000000001B460000-0x000000001B4CB000-memory.dmp

      Filesize

      428KB

    • memory/2228-12-0x00007FF9469E3000-0x00007FF9469E5000-memory.dmp

      Filesize

      8KB

    • memory/2228-13-0x00000000009C0000-0x0000000000B9A000-memory.dmp

      Filesize

      1.9MB

    • memory/2228-15-0x0000000001370000-0x000000000137E000-memory.dmp

      Filesize

      56KB

    • memory/2228-17-0x0000000002CF0000-0x0000000002D0C000-memory.dmp

      Filesize

      112KB

    • memory/2228-18-0x0000000002E90000-0x0000000002EE0000-memory.dmp

      Filesize

      320KB

    • memory/2228-20-0x0000000002D10000-0x0000000002D28000-memory.dmp

      Filesize

      96KB

    • memory/2228-22-0x0000000001490000-0x000000000149C000-memory.dmp

      Filesize

      48KB