Analysis

  • max time kernel
    129s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 02:22

General

  • Target

    6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f.exe

  • Size

    1.7MB

  • MD5

    7c12d48df8f08a95701197c514269a50

  • SHA1

    4f99360c54ad2cce0afe14ddb37697f6777795c8

  • SHA256

    6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f

  • SHA512

    37ed65a444ceba50af00e7570856cf3ae275bdbcb2acf6b72e0c3d3a6ba0361f0e1bf93ef1ae7a011dfc670c9840c43d88978c114f9f688bac1eff8f6d83b80d

  • SSDEEP

    24576:YciyxcGgPmGJ5CNvo3h9Uzt/RUr0YOnWiqj+7A/X0Vp6W5GuqSD5bdGjPIT9z:YsgB2yoQ4k/ECW5Gu5xdGjPIT9

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f.exe
    "C:\Users\Admin\AppData\Local\Temp\6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ddPghUJzXO.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:688
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:3748
        • C:\Windows\Microsoft.NET\Framework\taskhostw.exe
          "C:\Windows\Microsoft.NET\Framework\taskhostw.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:3932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ddPghUJzXO.bat

      Filesize

      176B

      MD5

      19fc392824f34b625adca2380632e69b

      SHA1

      8d314c0f9e78f4150a376258d8ee95acc467a5b3

      SHA256

      ddc055bd9f2d09a824152fd37b9589f93372134448cae3793a78d13b4d746307

      SHA512

      2472b47149dbc7f8761366eefd656dbb7d12d4aa23b4ba38d68c209ba0f8343e316c82278d26473f9bbb0b40a8afb2a98852f2b4ecad274e0b0a6b8cea75f173

    • C:\Users\Public\Pictures\RuntimeBroker.exe

      Filesize

      1.7MB

      MD5

      7c12d48df8f08a95701197c514269a50

      SHA1

      4f99360c54ad2cce0afe14ddb37697f6777795c8

      SHA256

      6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f

      SHA512

      37ed65a444ceba50af00e7570856cf3ae275bdbcb2acf6b72e0c3d3a6ba0361f0e1bf93ef1ae7a011dfc670c9840c43d88978c114f9f688bac1eff8f6d83b80d

    • memory/1204-6-0x0000000002C10000-0x0000000002C2C000-memory.dmp

      Filesize

      112KB

    • memory/1204-24-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-4-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-0-0x00007FFBF0A03000-0x00007FFBF0A05000-memory.dmp

      Filesize

      8KB

    • memory/1204-7-0x000000001B670000-0x000000001B6C0000-memory.dmp

      Filesize

      320KB

    • memory/1204-8-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-11-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-14-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-2-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-3-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-25-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-28-0x00007FFBF0A00000-0x00007FFBF14C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1204-1-0x0000000000930000-0x0000000000AE2000-memory.dmp

      Filesize

      1.7MB

    • memory/3932-33-0x00007FFBF0380000-0x00007FFBF0E41000-memory.dmp

      Filesize

      10.8MB

    • memory/3932-34-0x00007FFBF0380000-0x00007FFBF0E41000-memory.dmp

      Filesize

      10.8MB

    • memory/3932-35-0x00007FFBF0380000-0x00007FFBF0E41000-memory.dmp

      Filesize

      10.8MB

    • memory/3932-37-0x00007FFBF0380000-0x00007FFBF0E41000-memory.dmp

      Filesize

      10.8MB

    • memory/3932-38-0x00007FFBF0380000-0x00007FFBF0E41000-memory.dmp

      Filesize

      10.8MB

    • memory/3932-39-0x00007FFBF0380000-0x00007FFBF0E41000-memory.dmp

      Filesize

      10.8MB