Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 23:02
Behavioral task
behavioral1
Sample
Paypal Receipt Generator.exe
Resource
win7-20240215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Paypal Receipt Generator.exe
-
Size
355KB
-
MD5
81dc2cf4677a380a4572f61a14cd204c
-
SHA1
3a4d5b396cdf3c560159792a8608f934d44ee1b1
-
SHA256
2a173059e9f7d1147a60ebf89e4991592d55d66b551ec9a89397eabf1b0b8bfd
-
SHA512
20ec7ab40301bf858dd2b49fe22a3342b31960c21f897ab4d967454dae018b15ccfc8bccc6579354017319605ecdad15cb77afe9e59559ec0af41bf021c491fa
-
SSDEEP
6144:ElFhgyS7ovkgfyIUcVq1/U4OpTqUlqIWIVehKRy+zAaS:iyaHUH/PTP0Ry+E
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2260-1-0x0000000001260000-0x00000000012C0000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/2260-1-0x0000000001260000-0x00000000012C0000-memory.dmp net_reactor -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2608 2260 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Paypal Receipt Generator.exedescription pid Process Token: SeDebugPrivilege 2260 Paypal Receipt Generator.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Paypal Receipt Generator.exedescription pid Process procid_target PID 2260 wrote to memory of 2608 2260 Paypal Receipt Generator.exe 28 PID 2260 wrote to memory of 2608 2260 Paypal Receipt Generator.exe 28 PID 2260 wrote to memory of 2608 2260 Paypal Receipt Generator.exe 28 PID 2260 wrote to memory of 2608 2260 Paypal Receipt Generator.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paypal Receipt Generator.exe"C:\Users\Admin\AppData\Local\Temp\Paypal Receipt Generator.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 12962⤵
- Program crash
PID:2608
-