Analysis

  • max time kernel
    118s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 01:07

General

  • Target

    0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31.exe

  • Size

    1.9MB

  • MD5

    277ee62972ced037975513a5d4120175

  • SHA1

    6d7531f9447a58b8978c8a24c2f71e14eebb3ea6

  • SHA256

    0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31

  • SHA512

    9e53e3f7d966c334a59343d6b149961aff2e2e843fdf9e838c9b823cd23fb680ed4330ff8e3f76420e962567c80a7dec6a9bd207b0b5a1b5695817b72a902ebb

  • SSDEEP

    49152:xqfbh5qev49UlsetjyMjIRq/f1oUBT635:xq9wev49Ne4M//VBG

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31.exe
    "C:\Users\Admin\AppData\Local\Temp\0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vkfaol44\vkfaol44.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES21A4.tmp" "c:\Windows\System32\CSC3FB0BCE89E654246B8834B32AE6C533.TMP"
        3⤵
          PID:2604
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gwcbsFDSjL.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:2280
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • Runs ping.exe
            PID:3040
          • C:\Program Files\Windows Sidebar\ja-JP\services.exe
            "C:\Program Files\Windows Sidebar\ja-JP\services.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:956
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Sidebar\ja-JP\services.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2712
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\ja-JP\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2864
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\ja-JP\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2860
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\winlogon.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2452
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2800
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2948
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\smss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1492
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2328
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2008
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Office\Office14\csrss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1872
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1952
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\Office14\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:940
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\sppsvc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1436
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2500
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\it-IT\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2684
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc310" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1996
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1640
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc310" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1660

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Windows Sidebar\ja-JP\services.exe

        Filesize

        1.9MB

        MD5

        277ee62972ced037975513a5d4120175

        SHA1

        6d7531f9447a58b8978c8a24c2f71e14eebb3ea6

        SHA256

        0da0a8f9d90d7b0bba9460e5471a09dfdd76457ffec081c64b4f91262499cc31

        SHA512

        9e53e3f7d966c334a59343d6b149961aff2e2e843fdf9e838c9b823cd23fb680ed4330ff8e3f76420e962567c80a7dec6a9bd207b0b5a1b5695817b72a902ebb

      • C:\Users\Admin\AppData\Local\Temp\RES21A4.tmp

        Filesize

        1KB

        MD5

        dd3b0e8315e80d07a0782a3714b23852

        SHA1

        4e33935bcfd33884166461904cb56fe84819a169

        SHA256

        274cd73066ec8acada8c56f93471ec7cc47878d3759e92d32bf2e1be549fc162

        SHA512

        664b37950d41ea0f636c657710461acb811223eeeb9fcd742d1a9edc139c20ea727df80b722b63f5a2399b34b90a27df38f00fedd758c283d00220fd21aa02ca

      • C:\Users\Admin\AppData\Local\Temp\gwcbsFDSjL.bat

        Filesize

        179B

        MD5

        87c12e8aa0d8f21b71803b48131bfe65

        SHA1

        8e24df5fd769205b5f915936b6f19143616de0bc

        SHA256

        18217ddb0eb372d8fe95162680637108a01584380b5c57d5d4d39e01efa29cdb

        SHA512

        22ccb214038bcafc775479c69b3561b556d4fa1e74450ca289d0914fec3e11f7cff340ed38b545f047f21a83b3becc24ec3bf0a4fe13da9644cab9e63c64458a

      • \??\c:\Users\Admin\AppData\Local\Temp\vkfaol44\vkfaol44.0.cs

        Filesize

        383B

        MD5

        b83ed29316bb76c1dcaa2db0efb7fbc4

        SHA1

        9666b54cfa5513921ab49869aeec90023291819f

        SHA256

        adb5f27f336eef89bc5a7d20ac35ff4decced609a1913df9755247c8fbd0cce9

        SHA512

        91de69fceb2214f34ad0e408f2126007c214b01d63942c952019ea1d779cf12a8614f691a61488d284479edb094c39f53cf9716eaf747271675c586ca8501de9

      • \??\c:\Users\Admin\AppData\Local\Temp\vkfaol44\vkfaol44.cmdline

        Filesize

        235B

        MD5

        634f39eb71f0f0f720b99e7749a656a8

        SHA1

        f17aa72cb239041d9b1a9b4414e584b65e2f11dd

        SHA256

        9e0956fe56702088940461c5c968ecab39440b672610fbb96e3743395ca515dd

        SHA512

        282baf21d6508e49a345fcd688b0864e45bdcbd3b07764f042ca41b9f47c12eba4db11489dc2c4f1faaac7744f9ecdafab4a66ac300c0caae9df680b91e0101f

      • \??\c:\Windows\System32\CSC3FB0BCE89E654246B8834B32AE6C533.TMP

        Filesize

        1KB

        MD5

        3fcb2bd8a227751c0367dff5940613bb

        SHA1

        bcca174ab4499de5713d836fbc368966aa1f5b2c

        SHA256

        aca1f364ec354097cdecc50336698c1180b10ae84fc6051eab154482e0965e8c

        SHA512

        c7357bb6ee27df96ba39066e893ce8521cb1d5c550be24ced7f860e11cc36ecc04fbec14f61da920bca04e0ae150df8dbc53de0c4a6880afa6067bccfe767672

      • memory/956-56-0x0000000000AB0000-0x0000000000C98000-memory.dmp

        Filesize

        1.9MB

      • memory/1632-23-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-14-0x00000000005A0000-0x00000000005AE000-memory.dmp

        Filesize

        56KB

      • memory/1632-16-0x00000000007C0000-0x00000000007C8000-memory.dmp

        Filesize

        32KB

      • memory/1632-20-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-21-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-0-0x000007FEF5AD3000-0x000007FEF5AD4000-memory.dmp

        Filesize

        4KB

      • memory/1632-19-0x00000000007D0000-0x00000000007DC000-memory.dmp

        Filesize

        48KB

      • memory/1632-24-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-12-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-17-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-11-0x0000000000800000-0x0000000000818000-memory.dmp

        Filesize

        96KB

      • memory/1632-8-0x00000000007E0000-0x00000000007FC000-memory.dmp

        Filesize

        112KB

      • memory/1632-9-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-6-0x0000000000590000-0x000000000059E000-memory.dmp

        Filesize

        56KB

      • memory/1632-4-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-3-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-47-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-53-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-2-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

        Filesize

        9.9MB

      • memory/1632-1-0x0000000001250000-0x0000000001438000-memory.dmp

        Filesize

        1.9MB