Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 08:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8eb6ed01392a5cbba283febd7c9aa16a.exe
Resource
win7-20240221-en
windows7-x64
8 signatures
150 seconds
General
-
Target
8eb6ed01392a5cbba283febd7c9aa16a.exe
-
Size
791KB
-
MD5
8eb6ed01392a5cbba283febd7c9aa16a
-
SHA1
d472f8b50f8a9a6e583262f326a57927d9df940c
-
SHA256
b2e85f5907f28c7c9bfc0370be2567494e0fd11887dfc80ca62958d4f5fbf8a0
-
SHA512
e6f08c9036df0f8c7f38895f4bbf240d796b8da9838ac87c67c56122361675462844a99fed386856a09744d4beaba7f81431619696cea959f93dc0de1962151a
-
SSDEEP
12288:SaEg+LSgoEJHE6QxTZbZQIPqeEMbZO6MGomMRPArytpfoA:SaEgVrEJCTZlQISeEoq1J3pfx
Malware Config
Signatures
-
Detect ZGRat V1 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1660-3-0x000000001BDB0000-0x000000001BE64000-memory.dmp family_zgrat_v1 behavioral1/memory/2472-25-0x000000001B8A0000-0x000000001B9A4000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
Processes:
Powershell.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sys.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sys.exe Powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8eb6ed01392a5cbba283febd7c9aa16a.exedescription pid Process procid_target PID 1660 set thread context of 2472 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 30 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Powershell.exe8eb6ed01392a5cbba283febd7c9aa16a.exepid Process 2556 Powershell.exe 2472 8eb6ed01392a5cbba283febd7c9aa16a.exe 2472 8eb6ed01392a5cbba283febd7c9aa16a.exe 2472 8eb6ed01392a5cbba283febd7c9aa16a.exe 2472 8eb6ed01392a5cbba283febd7c9aa16a.exe 2472 8eb6ed01392a5cbba283febd7c9aa16a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Powershell.exe8eb6ed01392a5cbba283febd7c9aa16a.exedescription pid Process Token: SeDebugPrivilege 2556 Powershell.exe Token: SeDebugPrivilege 2472 8eb6ed01392a5cbba283febd7c9aa16a.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8eb6ed01392a5cbba283febd7c9aa16a.exedescription pid Process procid_target PID 1660 wrote to memory of 2556 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 28 PID 1660 wrote to memory of 2556 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 28 PID 1660 wrote to memory of 2556 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 28 PID 1660 wrote to memory of 2472 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 30 PID 1660 wrote to memory of 2472 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 30 PID 1660 wrote to memory of 2472 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 30 PID 1660 wrote to memory of 2472 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 30 PID 1660 wrote to memory of 2472 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 30 PID 1660 wrote to memory of 2472 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 30 PID 1660 wrote to memory of 2472 1660 8eb6ed01392a5cbba283febd7c9aa16a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eb6ed01392a5cbba283febd7c9aa16a.exe"C:\Users\Admin\AppData\Local\Temp\8eb6ed01392a5cbba283febd7c9aa16a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\8eb6ed01392a5cbba283febd7c9aa16a.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sys.exe'2⤵
- Drops startup file
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\8eb6ed01392a5cbba283febd7c9aa16a.exeC:\Users\Admin\AppData\Local\Temp\8eb6ed01392a5cbba283febd7c9aa16a.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-