Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/10/2024, 20:16

General

  • Target

    8cfa34b852352fc278e3babc8ff4ea3ef262fa3a61f954b0238eca4fb7ce9332.exe

  • Size

    1.8MB

  • MD5

    c2d8bedae4528c57ce2c30fad5d5f68d

  • SHA1

    cd6ba508c474b5b48c4c9314d7f929ef70af3850

  • SHA256

    8cfa34b852352fc278e3babc8ff4ea3ef262fa3a61f954b0238eca4fb7ce9332

  • SHA512

    a51d9d8a8c288639cfe3bea27ee19f2752467066793b8a513d4744e72e35bbb6b4fc4d30f06a868b77325c08ac8aea4d395f8825fa3e12548f4a39be3d4853b2

  • SSDEEP

    24576:B2j2LnLUrHpRfZDx41Ft8RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRH:c+XTjaMi40APE

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V2 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cfa34b852352fc278e3babc8ff4ea3ef262fa3a61f954b0238eca4fb7ce9332.exe
    "C:\Users\Admin\AppData\Local\Temp\8cfa34b852352fc278e3babc8ff4ea3ef262fa3a61f954b0238eca4fb7ce9332.exe"
    1⤵
      PID:2168

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2168-0-0x000007FEF5283000-0x000007FEF5284000-memory.dmp

      Filesize

      4KB

    • memory/2168-1-0x0000000000B60000-0x0000000000D26000-memory.dmp

      Filesize

      1.8MB

    • memory/2168-2-0x000007FEF5280000-0x000007FEF5C6C000-memory.dmp

      Filesize

      9.9MB

    • memory/2168-3-0x000000001B0F0000-0x000000001B1CC000-memory.dmp

      Filesize

      880KB

    • memory/2168-4-0x0000000000410000-0x000000000043C000-memory.dmp

      Filesize

      176KB

    • memory/2168-5-0x000007FEF5280000-0x000007FEF5C6C000-memory.dmp

      Filesize

      9.9MB