Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 12:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
15052024_1252_windows.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
15052024_1252_windows.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
15052024_1252_windows.exe
-
Size
4.5MB
-
MD5
ef0124f238734460752a0de9e85501bc
-
SHA1
8dcbd7b8c753329ffc4a68a4bac8c3ab5ba62dfb
-
SHA256
4a299f5b0de81d51e75d45e9b49e830e4230346329d9ed15197ddf1ac2853644
-
SHA512
6aa0476b378bf34eb274ef2b62d8cb12f2c5014cae0e02a6ffea55e4c0fd009e07f8816b23bb6ad2ed57a0a8173668ae3c24f94bcecd131348c5347510fcac3c
-
SSDEEP
24576:Qlrjm7Kt49nF49dqHsuCF04Q/qqO4NcAU3AFje+4VF9KfhtvI71TQcJWIK6u:v
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral1/memory/1848-2-0x000000001C530000-0x000000001C76E000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-6-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-3-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-8-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-14-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-16-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-20-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-22-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-24-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-28-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-34-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-38-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-40-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-36-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-32-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-30-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-26-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-18-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-12-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-10-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-4-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-42-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-44-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-46-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-54-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-62-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-56-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-66-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-64-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-60-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-58-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-52-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-50-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 behavioral1/memory/1848-48-0x000000001C530000-0x000000001C767000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
15052024_1252_windows.exedescription pid process target process PID 1848 set thread context of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
15052024_1252_windows.exedescription pid process Token: SeDebugPrivilege 1848 15052024_1252_windows.exe Token: SeDebugPrivilege 1848 15052024_1252_windows.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
15052024_1252_windows.exedescription pid process target process PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe PID 1848 wrote to memory of 1716 1848 15052024_1252_windows.exe 15052024_1252_windows.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15052024_1252_windows.exe"C:\Users\Admin\AppData\Local\Temp\15052024_1252_windows.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\15052024_1252_windows.exe"C:\Users\Admin\AppData\Local\Temp\15052024_1252_windows.exe"2⤵PID:1716
-