Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 01:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exe
Resource
win7-20240508-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exe
-
Size
596KB
-
MD5
db537a09e0185f8b941af6a5d2ceda40
-
SHA1
8747013070a23b3d9dd386c1baab0cb79cff3786
-
SHA256
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf
-
SHA512
1ecd816a35c50ccbb78a3911d517fe292c4ac8431cc54446ffd3136657dc0d1cc793800c5c5bef31cd76847c0c2cf1968c87f68b841a4bd245e1ced7ab3a37c7
-
SSDEEP
12288:Z48Xz4N3jJuKiMGejML/ldDKdgM/pMp00TIhmP8mWdCcLxUX0M39F+n:ePNT0KR/MqdgMhr6IhmkmWXuEM3Cn
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral2/memory/4352-2-0x0000000005560000-0x0000000005648000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-45-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-57-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-55-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-67-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-65-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-63-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-61-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-53-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-51-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-49-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-47-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-41-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-40-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-37-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-35-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-33-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-31-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-27-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-21-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-19-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-17-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-15-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-10-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-59-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-4-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-43-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-29-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-25-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-23-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-13-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-11-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-7-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 behavioral2/memory/4352-5-0x0000000005560000-0x0000000005642000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exedescription pid Process Token: SeDebugPrivilege 4352 2a111b1a6650ea6e6b369583f8afe1bf8c5bb6164cb12f8e833d0638c1c2deaf.exe