Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 21:02
Behavioral task
behavioral1
Sample
d2bf59d1f0e16266da3b39cad457c52feb0bbdba049937e3efa7e02b62d85b30.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
d2bf59d1f0e16266da3b39cad457c52feb0bbdba049937e3efa7e02b62d85b30.exe
-
Size
1.9MB
-
MD5
28200b8c5f46f34210a28117690e4717
-
SHA1
7e8ba2f44b31e2daa0720024b013860bd0cfb9fb
-
SHA256
d2bf59d1f0e16266da3b39cad457c52feb0bbdba049937e3efa7e02b62d85b30
-
SHA512
d836fffe20c927cab8b0038f3bcabcac966e6c710e7c3048221761bdd29d8807c01f20005b8d7cd5a91fa70cb40862d0801901f1610319e011027bf15220c50c
-
SSDEEP
24576:Q2LnLUrHpRfZDx41Ft8RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR:X1mq7GmMSqd+DGNMxFTsalQ
Malware Config
Signatures
-
Detect ZGRat V2 2 IoCs
resource yara_rule behavioral2/memory/3472-1-0x00000000000C0000-0x00000000002A8000-memory.dmp family_zgrat_v2 behavioral2/memory/3472-5-0x0000000004ED0000-0x0000000004FAC000-memory.dmp family_zgrat_v2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2bf59d1f0e16266da3b39cad457c52feb0bbdba049937e3efa7e02b62d85b30.exe