Analysis
-
max time kernel
35s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 00:49
Static task
static1
1 signatures
General
-
Target
Kaxhwswfup.exe
-
Size
4.5MB
-
MD5
133fda00a490e613f3a6c511c1c660eb
-
SHA1
e34f9f1c622a7e6d3cb34217b0935ebdaab8ebe9
-
SHA256
cac0056b23a93519a5f4e526e52187f37b88373c76aa065b9f895d1ecd4f4169
-
SHA512
f4dd02b04326e37a3368d9c385b363689f877ae43c16de103efada642f41fe85580939db84a030597e3032d6da407d073af2b64160feec6fe38f37f1b473fffd
-
SSDEEP
24576:ypPiRcjGOOiX3Sl9L7MupXdagdle6whTeo5A4T9W+xjaCsyfwUmvHX+ODvz8JQDm:
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral1/memory/2748-2-0x0000000006500000-0x0000000006740000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-10-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-14-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-42-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-68-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-66-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-64-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-62-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-60-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-58-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-56-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-54-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-50-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-46-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-52-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-48-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-44-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-40-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-38-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-36-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-34-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-32-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-30-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-28-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-26-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-24-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-23-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-20-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-16-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-12-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-8-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-6-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-18-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 behavioral1/memory/2748-5-0x0000000006500000-0x000000000673A000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Kaxhwswfup.exedescription pid Process Token: SeDebugPrivilege 2748 Kaxhwswfup.exe