Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 01:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exe
Resource
win7-20240508-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exe
-
Size
596KB
-
MD5
db537a09e0185f8b941af6a5d2ceda40
-
SHA1
8747013070a23b3d9dd386c1baab0cb79cff3786
-
SHA256
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf
-
SHA512
1ecd816a35c50ccbb78a3911d517fe292c4ac8431cc54446ffd3136657dc0d1cc793800c5c5bef31cd76847c0c2cf1968c87f68b841a4bd245e1ced7ab3a37c7
-
SSDEEP
12288:Z48Xz4N3jJuKiMGejML/ldDKdgM/pMp00TIhmP8mWdCcLxUX0M39F+n:ePNT0KR/MqdgMhr6IhmkmWXuEM3Cn
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral1/memory/3016-2-0x00000000047C0000-0x00000000048A8000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-4-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-9-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-27-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-49-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-5-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-67-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-65-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-63-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-61-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-59-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-57-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-55-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-53-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-51-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-47-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-45-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-43-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-41-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-39-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-37-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-35-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-33-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-31-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-29-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-25-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-23-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-21-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-19-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-17-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-15-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-13-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-11-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-7-0x00000000047C0000-0x00000000048A2000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exedescription pid Process Token: SeDebugPrivilege 3016 2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exe