Analysis

  • max time kernel
    119s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 21:06

General

  • Target

    277EE62972CED037975513A5D4120175.exe

  • Size

    1.9MB

  • MD5

    277ee62972ced037975513a5d4120175

  • SHA1

    6d7531f9447a58b8978c8a24c2f71e14eebb3ea6

  • SHA256

    0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31

  • SHA512

    9e53e3f7d966c334a59343d6b149961aff2e2e843fdf9e838c9b823cd23fb680ed4330ff8e3f76420e962567c80a7dec6a9bd207b0b5a1b5695817b72a902ebb

  • SSDEEP

    49152:xqfbh5qev49UlsetjyMjIRq/f1oUBT635:xq9wev49Ne4M//VBG

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\277EE62972CED037975513A5D4120175.exe
    "C:\Users\Admin\AppData\Local\Temp\277EE62972CED037975513A5D4120175.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pjj41loe\pjj41loe.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES37A4.tmp" "c:\Windows\System32\CSC5B9ACA7D5AA545B781DAF050953AA1D.TMP"
        3⤵
          PID:2524
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vzoSCQWDHU.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:1076
          • C:\Windows\system32\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            3⤵
              PID:568
            • C:\Users\Admin\AppData\Local\Temp\277EE62972CED037975513A5D4120175.exe
              "C:\Users\Admin\AppData\Local\Temp\277EE62972CED037975513A5D4120175.exe"
              3⤵
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:1784
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Windows\Prefetch\ReadyBoot\wininit.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:2640
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Prefetch\ReadyBoot\wininit.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:2724
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\Prefetch\ReadyBoot\wininit.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:2496
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\csrss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:344
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:2564
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:2784
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:752
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1968
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:884
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\explorer.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:2140
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1900
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\explorer.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1636
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\audiodg.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:756
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\audiodg.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:668
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\audiodg.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1440
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "277EE62972CED037975513A5D41201752" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\AppData\Local\Temp\277EE62972CED037975513A5D4120175.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1844
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "277EE62972CED037975513A5D4120175" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\277EE62972CED037975513A5D4120175.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1348
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "277EE62972CED037975513A5D41201752" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\AppData\Local\Temp\277EE62972CED037975513A5D4120175.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:2252

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RES37A4.tmp

          Filesize

          1KB

          MD5

          8a34b04e1515d70e29f9eb1c90296e75

          SHA1

          51e605963755e40a31c44f6aeba02fb803d9eb1b

          SHA256

          4198cae48c58a97b4cee7a8c641c33a9e169b90f589e7ec1945866e5e707edb4

          SHA512

          79952321002e1c2cb0938b3439b5cab1c7d25964f4af86f5db545eedfede6c4b89e5b58976eb0d1d55a5420281409b0eec7dca9d0c0b47c7f37efb8ce1fdc816

        • C:\Users\Admin\AppData\Local\Temp\vzoSCQWDHU.bat

          Filesize

          246B

          MD5

          2e24a7a718ca9fdd9a807f7b4085e4be

          SHA1

          ee1bdb9407c35709d96dab2535e059290b0ddc84

          SHA256

          dfdbcb0504f5c1d1acff4b9669d3d20bda7a060362e4dc018cf1da4f22c48de9

          SHA512

          700c5e2125fbb49e1ba82142c168daedc67d20261a217336908eb1e905fa5ccc3336167f8acec2ec34d4379e96fdc73b8286b640eaec213640a5891cf64401c8

        • C:\Windows\Prefetch\ReadyBoot\wininit.exe

          Filesize

          1.9MB

          MD5

          277ee62972ced037975513a5d4120175

          SHA1

          6d7531f9447a58b8978c8a24c2f71e14eebb3ea6

          SHA256

          0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31

          SHA512

          9e53e3f7d966c334a59343d6b149961aff2e2e843fdf9e838c9b823cd23fb680ed4330ff8e3f76420e962567c80a7dec6a9bd207b0b5a1b5695817b72a902ebb

        • \??\c:\Users\Admin\AppData\Local\Temp\pjj41loe\pjj41loe.0.cs

          Filesize

          373B

          MD5

          8bcc880c55541810ab1219d61e553875

          SHA1

          cfc1b22ed079c178e4fdbe5285f055a05e59a593

          SHA256

          3d6ccf38d569cae50c7cbcb1e876b5e23419a591c9cdc3d09011859916fc2382

          SHA512

          70b7c203321f69a110df02ae2177102f966401fb3836290ef00781cd88fc0724f22a9857af82791faa920a8188bacb6fd5ff03f1dcd92b923213e90d4d7b6a25

        • \??\c:\Users\Admin\AppData\Local\Temp\pjj41loe\pjj41loe.cmdline

          Filesize

          235B

          MD5

          a713c52aff54a4c884a127b9ceecdfaa

          SHA1

          d9863639d7076a767ed4ebc2a6e3be1dfdfec76a

          SHA256

          d12fb97f96edc94133e3569703406bd8982a9bf1ba2efcf11c2cb23b4516c699

          SHA512

          f5d55056044c0dea8b0f44685e4337c4f5db28b419ba0131343f63d5f358082b161cf8b703dcca5d408948dc77df7f8ed1ae86c17039d02bb21926dce96ea19f

        • \??\c:\Windows\System32\CSC5B9ACA7D5AA545B781DAF050953AA1D.TMP

          Filesize

          1KB

          MD5

          dc62d02b56d310e294d158c225b91f50

          SHA1

          844e69b5ff0328e80441c54dbdff39d82c3263ba

          SHA256

          be8b5c97dc2eb2b7a62245da79d879ac20bb8e123c06b565f27e330bfe4fa0f8

          SHA512

          23e9004baf3f7dc17611fa3fa65e5c8dbd0c49cb43b831688eec9b938c28a3ca6029d737de77810271ac9f0779c27f62db123d2831aee13527d0a3088c39c209

        • memory/2556-7-0x0000000000290000-0x000000000029E000-memory.dmp

          Filesize

          56KB

        • memory/2556-19-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-11-0x0000000000520000-0x0000000000538000-memory.dmp

          Filesize

          96KB

        • memory/2556-13-0x00000000002A0000-0x00000000002AE000-memory.dmp

          Filesize

          56KB

        • memory/2556-16-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-15-0x00000000002B0000-0x00000000002B8000-memory.dmp

          Filesize

          32KB

        • memory/2556-22-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-27-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-20-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-9-0x00000000004E0000-0x00000000004FC000-memory.dmp

          Filesize

          112KB

        • memory/2556-18-0x00000000002C0000-0x00000000002CC000-memory.dmp

          Filesize

          48KB

        • memory/2556-0-0x000007FEF5BF3000-0x000007FEF5BF4000-memory.dmp

          Filesize

          4KB

        • memory/2556-5-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-4-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-3-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-2-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-46-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2556-1-0x0000000000AC0000-0x0000000000CA8000-memory.dmp

          Filesize

          1.9MB

        • memory/2556-52-0x000007FEF5BF0000-0x000007FEF65DC000-memory.dmp

          Filesize

          9.9MB