Analysis

  • max time kernel
    130s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 19:26

General

  • Target

    7C12D48DF8F08A95701197C514269A50.exe

  • Size

    1.7MB

  • MD5

    7c12d48df8f08a95701197c514269a50

  • SHA1

    4f99360c54ad2cce0afe14ddb37697f6777795c8

  • SHA256

    6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f

  • SHA512

    37ed65a444ceba50af00e7570856cf3ae275bdbcb2acf6b72e0c3d3a6ba0361f0e1bf93ef1ae7a011dfc670c9840c43d88978c114f9f688bac1eff8f6d83b80d

  • SSDEEP

    24576:YciyxcGgPmGJ5CNvo3h9Uzt/RUr0YOnWiqj+7A/X0Vp6W5GuqSD5bdGjPIT9z:YsgB2yoQ4k/ECW5Gu5xdGjPIT9

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7C12D48DF8F08A95701197C514269A50.exe
    "C:\Users\Admin\AppData\Local\Temp\7C12D48DF8F08A95701197C514269A50.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SoqKOWyve6.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:632
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:688
        • C:\Recovery\WindowsRE\backgroundTaskHost.exe
          "C:\Recovery\WindowsRE\backgroundTaskHost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\WindowsRE\backgroundTaskHost.exe

      Filesize

      1.7MB

      MD5

      7c12d48df8f08a95701197c514269a50

      SHA1

      4f99360c54ad2cce0afe14ddb37697f6777795c8

      SHA256

      6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f

      SHA512

      37ed65a444ceba50af00e7570856cf3ae275bdbcb2acf6b72e0c3d3a6ba0361f0e1bf93ef1ae7a011dfc670c9840c43d88978c114f9f688bac1eff8f6d83b80d

    • C:\Users\Admin\AppData\Local\Temp\SoqKOWyve6.bat

      Filesize

      172B

      MD5

      2320a5d889b14e2f0b8d178f455f593c

      SHA1

      d222b8ee902354e143cea308c9bced0793f5995d

      SHA256

      efb245b802449de74000fed047abf34c3c4800ac07d6fb63893393a82fb26d90

      SHA512

      3bc9d6b926410b60d28a02fa3b7ce3cf6739c69e360879c3f60d7511e0f4b4a7cbccddff063e34aca483096eba6f8daf5f21b20e86346777e62233d64ed19373

    • memory/368-38-0x00007FFBF0530000-0x00007FFBF0FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/368-37-0x00007FFBF0530000-0x00007FFBF0FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/368-36-0x00007FFBF0530000-0x00007FFBF0FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/368-34-0x00007FFBF0530000-0x00007FFBF0FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/368-33-0x00007FFBF0530000-0x00007FFBF0FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/368-32-0x00007FFBF0530000-0x00007FFBF0FF1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-6-0x0000000002410000-0x000000000242C000-memory.dmp

      Filesize

      112KB

    • memory/1204-9-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-20-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-24-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-8-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-28-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-7-0x000000001AFC0000-0x000000001B010000-memory.dmp

      Filesize

      320KB

    • memory/1204-0-0x00007FFBF0A03000-0x00007FFBF0A05000-memory.dmp

      Filesize

      8KB

    • memory/1204-4-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-3-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-2-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-1-0x0000000000010000-0x00000000001C2000-memory.dmp

      Filesize

      1.7MB