Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
Copy00106258873.exe
Resource
win7-20240508-en
windows7-x64
18 signatures
150 seconds
Behavioral task
behavioral2
Sample
Copy00106258873.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Copy00106258873.exe
-
Size
308KB
-
MD5
1ee185cb3b4f78f2a24e61798952178b
-
SHA1
8049b95b5250bad311950a218de4b9727e8f4579
-
SHA256
3d75eede311931faf4dc46008199f7dc49a42237388ac8471c3a5a07432fb243
-
SHA512
d16938efe9ec9936266e9c37b9c85b5f26cdfc66cc9c552186c3973ebed1c7e9f0f9f380f39cc113c03e7983dd9188a5e7292115748d78953101cfd359f0a93f
-
SSDEEP
3072:iOvQ/IaGuDfIeqpMTxV/wP8rjAILNnCDDRvLGmrOAOkGt6+duWA/t/SHUebbxCbO:FQIZe+MFVXx9stvLGtELbMUTKZ1H
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/4816-3-0x0000000007A90000-0x0000000007CC6000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-6-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-9-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-7-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-33-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-23-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-21-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-20-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-17-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-15-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-13-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-11-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-49-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-65-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-63-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-59-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-57-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-55-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-53-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-61-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-51-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-47-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-45-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-43-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-41-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-39-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-37-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-35-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-31-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-29-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-27-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-25-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-69-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 behavioral2/memory/4816-67-0x0000000007A90000-0x0000000007CC0000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\savef = "C:\\Users\\Admin\\AppData\\Roaming\\savef.exe" Copy00106258873.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4816 set thread context of 3552 4816 Copy00106258873.exe 82 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4816 Copy00106258873.exe Token: SeDebugPrivilege 4816 Copy00106258873.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82 PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82 PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82 PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82 PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82 PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82 PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82 PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82 PID 4816 wrote to memory of 3552 4816 Copy00106258873.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Copy00106258873.exe"C:\Users\Admin\AppData\Local\Temp\Copy00106258873.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3552
-