Analysis

  • max time kernel
    142s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 12:30

General

  • Target

    8246f422d28415bbb58d8fa3e2891817.exe

  • Size

    582KB

  • MD5

    8246f422d28415bbb58d8fa3e2891817

  • SHA1

    0a7d9fa2340210aa6090be64a26385b78d13c6ef

  • SHA256

    9f38ec0ae60879931f99054695285b54f0d2454990249d4672acfb568905bf91

  • SHA512

    4f44bcb125b14b86f6b772d23a99338be0394d04a32839a0bc7bd0344cab785bde2529bcd01a62032f74614125718666935fa4be1d276e60ce9969200ff317f0

  • SSDEEP

    12288:es7vnRmS7+nqB3visIP1z20lBoLhaByXOh7OWMsIaHqZm+Ps6:XvQSUq0sIPB20UVasX07isFHqZm+Ps6

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8246f422d28415bbb58d8fa3e2891817.exe
    "C:\Users\Admin\AppData\Local\Temp\8246f422d28415bbb58d8fa3e2891817.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:1224
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:3004
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:684
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
              PID:4400
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4040

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Credential Access

          Unsecured Credentials

          2
          T1552

          Credentials In Files

          2
          T1552.001

          Discovery

          Query Registry

          1
          T1012

          Collection

          Data from Local System

          2
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3448-0-0x0000000000E60000-0x0000000000E61000-memory.dmp
            Filesize

            4KB

          • memory/3448-1-0x0000000000E60000-0x0000000000E61000-memory.dmp
            Filesize

            4KB

          • memory/3448-3-0x0000000000E60000-0x0000000000E61000-memory.dmp
            Filesize

            4KB

          • memory/4040-2-0x0000000000400000-0x000000000046C000-memory.dmp
            Filesize

            432KB

          • memory/4040-4-0x000000007420E000-0x000000007420F000-memory.dmp
            Filesize

            4KB

          • memory/4040-5-0x0000000005E00000-0x00000000063A4000-memory.dmp
            Filesize

            5.6MB

          • memory/4040-6-0x0000000005850000-0x00000000058E2000-memory.dmp
            Filesize

            584KB

          • memory/4040-7-0x0000000074200000-0x00000000749B0000-memory.dmp
            Filesize

            7.7MB

          • memory/4040-8-0x0000000005800000-0x000000000580A000-memory.dmp
            Filesize

            40KB

          • memory/4040-9-0x0000000008BB0000-0x00000000091C8000-memory.dmp
            Filesize

            6.1MB

          • memory/4040-10-0x00000000086E0000-0x00000000087EA000-memory.dmp
            Filesize

            1.0MB

          • memory/4040-11-0x0000000008610000-0x0000000008622000-memory.dmp
            Filesize

            72KB

          • memory/4040-12-0x0000000008670000-0x00000000086AC000-memory.dmp
            Filesize

            240KB

          • memory/4040-13-0x00000000087F0000-0x000000000883C000-memory.dmp
            Filesize

            304KB

          • memory/4040-14-0x0000000008960000-0x00000000089C6000-memory.dmp
            Filesize

            408KB

          • memory/4040-15-0x00000000092D0000-0x0000000009346000-memory.dmp
            Filesize

            472KB

          • memory/4040-16-0x0000000008B40000-0x0000000008B5E000-memory.dmp
            Filesize

            120KB

          • memory/4040-17-0x000000000A040000-0x000000000A202000-memory.dmp
            Filesize

            1.8MB

          • memory/4040-18-0x000000000A740000-0x000000000AC6C000-memory.dmp
            Filesize

            5.2MB

          • memory/4040-20-0x0000000074200000-0x00000000749B0000-memory.dmp
            Filesize

            7.7MB