Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2024, 21:18

General

  • Target

    Data/BB2.exe

  • Size

    247KB

  • MD5

    0f71306382369d8d08598bee5403bcb5

  • SHA1

    b4530c2d598c9d48d18e53cb26b87a07ab4108a1

  • SHA256

    dc0f37fdd2414feba7fc57d18fe8407cb4d891e139a462f75758ef97f61694cd

  • SHA512

    07644af616316c155ae20220aafe83d2a6b911d73f9af7bd3a3ffbe8a4517d0cb5c41bbbca32d5d0e0772ad54bdeed44705e1c903af450724dccfb4e2f3e7fc5

  • SSDEEP

    1536:f7f9h0UPJP/CpICdikMLMLv5PFNg1qrX+VIOlnToIfPgIxYnPf8O9:TliUPXC8k1nJrX+fNTBf7i9

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V2 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Zgrat family
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Data\BB2.exe
    "C:\Users\Admin\AppData\Local\Temp\Data\BB2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6F75.tmp\6F76.tmp\6F77.bat C:\Users\Admin\AppData\Local\Temp\Data\BB2.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://crackingparadox.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2500
      • C:\Users\Admin\AppData\Local\Temp\Data\BlackBullet2.exe
        BlackBullet2.exe FL
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01edd4e30278ad962bb45afb1db008d7

    SHA1

    1a571dc5456797ad8eaf9708ba6979cbd2095d2e

    SHA256

    30e23b51ce439a840c8a3acf5f0280a20cf2b7fce2d223a88bcc5c92f97c113a

    SHA512

    8c045b4f164ff00ba04e34971cf640a53c238e3758eee13f8c12bb41d5c79d3a9754c4e29a7e903876a18aa58643b614d4b2538e3ac3618e72e77bc67838eca7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d236884b9cd559be09c32f44410a5fb9

    SHA1

    71452afcce96891dc5046f644a146c222e5c5d22

    SHA256

    b31052d5a4b9d3da375bea6f29e083541af4c6b354a14ce6c73d460927e676dd

    SHA512

    60b68a98efb400db8665b6ca005503d00d1ac24345948ef120e631cd895b7d6a439eb5704f8bd2372b94e7b8487cc2f7a51095c32e058c39efd118eee9e61169

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42b6ebbb7b6c5d5dbbe9cd462076e5a7

    SHA1

    061dcd64c04c94e90f14ca45654cd20bde27b70b

    SHA256

    3212aacd886a8ead988a14b325addd524fdc180b9ce949386a32468e3604dbcd

    SHA512

    69aae21e1623658015aa350cfccabf7735d852c1abeff82b1d0585f8f896ef693170087cb68149f5a398de897c6956e13e5cf60f9fa432a149810948001e81fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0985fa55fdc3a5c5dc3dfac821f5dae7

    SHA1

    0be071b95e41f4e651e387de3d9e4b677b3eda6e

    SHA256

    dd8abdab6867957d4dfb6d4fed2fc882821551ad0b1458e1099a7944783e7118

    SHA512

    cd3daaa83841a130ac6c67f899ac62423fa91ee1072f4728c89d423c717c6cb61ace8f3161a5b5d555335eab09636e2ebf032bc5dacecbea492ab24a43f50eac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7fff3ce888345b71dcf600022060e0a

    SHA1

    57a6e58db25938c123130d82e71fdb294785a1bc

    SHA256

    f68da501df3090e75259cb74269738691cb3ca84899856b4bd067173483cd240

    SHA512

    e89eedaa85d22c18037151e7ec90cf1b26c3908f933a1048dd746ca1c376211fcb4aacabef0fc3f288674a146b94709791c372cf9e2e5fd1203b66c9532b530f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    840aec93bc0e33009a98984febc34437

    SHA1

    b8d548c8b8d4e9da619185a498a4384764c4623b

    SHA256

    3ca4bd3a49d4531559e82087eecc215239d50743eff5b1731624ca596d9eaaaa

    SHA512

    a7238bfc012f949a973023b761cc776ff4b9271bed144f1e1e49b6899962b845811130588fdb7beab51842dea31373d5380502ff8a9bd57e22a6533ae419d8ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4f5522cb1069a8eff568c98f46ec022

    SHA1

    55eb2ae3deec245beb00d51af2d06537ae219aac

    SHA256

    c67fe383d4ad36f6963b9ade526da840783efa3f1dfc3a71157996adba5a80fe

    SHA512

    171d77970309aea187ce7496ee577efb7d402260d08f0268c2a69ea082b6ee53bea753bd4cb2f2572edebcdb9f593ece65f74b91e47a4e67f0e84b864e4c6783

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f13bda398657dc9ff4cc3eded5e2ae07

    SHA1

    8a95137dea29c77fdb2ee1d8fb337d1bc1be7fe6

    SHA256

    8ee6a9c193f1e4c3d96d0a4a35eb9bbe7c648a29ada4a81657a8148743cfab9b

    SHA512

    55dc93f1b984043d4aa798abda2b7b17ffce7b4177e616c0e1aa709cc9ac3958d0f3f35a805574fe02f041c4e3554eabbdbe3941f94fd9f5883fc678d047b5e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19301868f257b2783ee00219b154af62

    SHA1

    a346d137ce7372c75fee215015c4766addb47384

    SHA256

    96e3aed96a85dab255c7f68635025d3601561a858fe86baf5ce858f5bc4bb0db

    SHA512

    d64faede9f9cc4371178cb416d023abe40455725a0ab6a65dd8eb04fb1b6030a2308b7916941eb968edf70311a507b7fb4e76b3c3cfb9c765412be3f84552f69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    940fc70f4cb5c8cad7021db11b23ca68

    SHA1

    df66c8f5b55f5aa2e501b3aaa6fa9f705136e976

    SHA256

    1c5b4bcc80a3011da5f6f92be93882df2a0cca76843b002c679fa5360ebbb2ae

    SHA512

    bf9a2a310dcb535036c4118a1e883056e6dd3bca000bfbda2b6c15fd94e2b8ae8a076d9f0bc76aa76b9f47167a5d46e76212caf139a18757102c38cf48e511d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d67641ddc4c08f64246470696315f1f

    SHA1

    86f05c852d4e9ec45ba48c5beb20d8e9e58bc6be

    SHA256

    3f491c95bc9f8174f118bdf2f787c5d74b85f3dbb767bdbc968ea1db629825be

    SHA512

    665ed113673028a4ac4fad08ac279af5c97dc4c874fae175c5b664119913b11c641a0e6de328b3a9a39913e13a0bc359f860214818805919759252dba5955be2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a426cf8a7667038d753416aecc5e0c17

    SHA1

    8e7aa800c654f0788eb41ebb6c42dd5e55543e29

    SHA256

    a7b68ac2ad41561aa72e1a8b2670fc2321ec9cc8eff5e170b8a8d91e59c7dcb5

    SHA512

    8baf4ee9d1911cad9f470932666714bd2202f0dd048bd5cdca46b3e4ab543ad51582bba649d70d9af494e0ff87e9d3c02c18e65d945fddcd5050247a29f12710

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b57b196ab6b78b397114192b6ff4681

    SHA1

    e37d9f11fb1900fbea8965e1766ab8eb4df76422

    SHA256

    50d0b102f26b426a5876f66bc0444b491ad24ba780921931340393da15f3ac93

    SHA512

    bd073c33f3278529e67beaafe426f3cb19150a8ef0c13f89e9217885826c00f14ec207c2bf7a40d1687c744722da2aaf1f92ef93f962ce83ab6c8fdf0f7951f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5305f161d00e06e3763250a5911acb3

    SHA1

    4b18540550cbda18943ae6f5d969761094e95bdd

    SHA256

    b7c88e065658d552cb46791911e41024f30969bde51f12e2739ba3bf227ec602

    SHA512

    422316ae8aa829f03b3b6dbad52b17bf91674e36f99f11a43450e0ab2c3373407f9644aa5e1999009712f5589ff6d30f988771d41573e24814687e8dae76da80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ed027594179592b3c26df8a5904099c

    SHA1

    c8f5822232d5f2e65b91de79d7d7bd17e817a9e0

    SHA256

    59eb6905042fb32aa4cbfece573baed98693c3b966d862b9f1d5dff5f781bed8

    SHA512

    c449a91d9431e51e4288c93299e680d6b810a20e583707da8da4860a6563a51e20c97de0979725bfbb1378741b64fe50163b68f7fcae3c76bef7d6d8d2d0055e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c54805ea89ff41ed929c9ab302acc4f

    SHA1

    d38d0c93f949d7692b9fca13e75e6a9f9bfcad41

    SHA256

    b1e97f074dba954380c8a68fefa73836faa93a4b8c9074f6cc27ffefcc317d2a

    SHA512

    b8202e056826d1ef9f5f88341ad3f85b7abcb299d2198b748076d283807329914bc582efee7c9b9b2a33221e01beb74e43bea2fac80a2fdbe0b4b60dbe311e2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1704490db84c60b875f66579d5f9041

    SHA1

    68ecf5ed422b4aa85b36350655ac678e62ee94f3

    SHA256

    e1888afb59f3be4763d5c04af9154539ef9532de6b46dd49b533059d831fd1a6

    SHA512

    4c494b2083c011ad627cb1d3fbd811631ce4e738a61bd712fe6f5667847a1c5b6165202c6c50f434f98d19a33e59add97065054f9669684a5005b358002a1e86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20b1d3ca9a133e93e85d880c7829081b

    SHA1

    21856b973a68e377597b072e87560f5448fdb576

    SHA256

    51003532266aa5a1059d3ca52575962db8cc45ffcc00236cbe12b415d319c9b2

    SHA512

    d949484f77ad2c3158b316f3ed1fe3e979b72966381e81048e342a32dab701d716b3bdeabbc228df8faebb72214d17fb5928742b40833117bd0d20a0b0444e03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea070bf30847d35441fe293d9a9f7dc8

    SHA1

    e3efadf313328763f8d40ab3425871dd96eea7a3

    SHA256

    f1e0d826c51ae42bd443d965ecd71b48d2377231aaccc12be208fa2902efaf9b

    SHA512

    ba8c3478a86ceae838b0a232bf6d9aed4b98e43dd9b944dc7fd39888df9767efa2a5fe5fa7851d0a41de345b439a8b70dab9d6eb57e31d65f77f6222038a2adf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae66f62e88c6bfede8b79d9aa7b67633

    SHA1

    312b12772516db811764b31de82b6eef12ce4860

    SHA256

    1a5ade1ca57f9fbf85315166a17e989aa7a7892c79c0703f1720f8430929bd6f

    SHA512

    3d60b2468f58db41e6f4879007a07c226c3bc8c8dddc1cf6722016ab722d85d8d0c3a8711cf6ff053bcb74713e02d981fce8aee0ee4acd6203b774e1b0f0e606

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e97a34804b6543c326cead67c0067cd

    SHA1

    642a52a560949e052e46d5d5825b73e96fc173b2

    SHA256

    5be9925e3b17886cce1aa5aeb8d6ce5d2a93283cbe683159eceb33f2d16f0f36

    SHA512

    02320fb248b1b478539893febf41791abaadde4d14fcf47916dab4d5bc07a82b22461cdc68bdd986c728e1287800bf9cdcfd9f6e7196431774122dbc5f8cfa3e

  • C:\Users\Admin\AppData\Local\Temp\6F75.tmp\6F76.tmp\6F77.bat

    Filesize

    71B

    MD5

    2a0d73d98b428296a6e4dd75d20356c8

    SHA1

    48fb89a2afb456f31d75e23e6a7df0fda4ef3e2f

    SHA256

    36afdc556332525b8de95bfb7b83e266dc9d90746084cc6ded0f74a96cba26b2

    SHA512

    6f2bd412360157d1b7edbe1501adb978fb6f47aae0c7161c40c608c1317ac8e6ade80aecaf6297ca2e6fdea04f490954b7a91d5a6df03ab6e00f70ff78307697

  • C:\Users\Admin\AppData\Local\Temp\Cab8CD7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8D77.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\evb7883.tmp

    Filesize

    1KB

    MD5

    dd6e920cae4262f4116706722b5c2d2b

    SHA1

    823c70ddfd94e4108001a2da7720aaa0aa721a39

    SHA256

    cce540819490859a84ba53c71b3a9e57978c7c1ef00114b24712037e0e5080a1

    SHA512

    30ef35e89e3150e9309519d14a270a36822b58a30d784ae1377a66b4655b428eb935c354d0fd4768e09d0115900ff1138795feddbffd98315ef2922cf44cd667

  • memory/2692-64-0x0000000073ECE000-0x0000000073ECF000-memory.dmp

    Filesize

    4KB

  • memory/2692-92-0x0000000006000000-0x0000000006078000-memory.dmp

    Filesize

    480KB

  • memory/2692-91-0x0000000005C70000-0x0000000005C7A000-memory.dmp

    Filesize

    40KB

  • memory/2692-90-0x00000000061E0000-0x00000000061E8000-memory.dmp

    Filesize

    32KB

  • memory/2692-89-0x0000000006070000-0x0000000006078000-memory.dmp

    Filesize

    32KB

  • memory/2692-88-0x0000000006040000-0x000000000604A000-memory.dmp

    Filesize

    40KB

  • memory/2692-80-0x0000000002820000-0x000000000283C000-memory.dmp

    Filesize

    112KB

  • memory/2692-85-0x0000000005C20000-0x0000000005C8A000-memory.dmp

    Filesize

    424KB

  • memory/2692-87-0x0000000010000000-0x0000000010040000-memory.dmp

    Filesize

    256KB

  • memory/2692-86-0x0000000006000000-0x0000000006040000-memory.dmp

    Filesize

    256KB

  • memory/2692-70-0x0000000002820000-0x0000000002840000-memory.dmp

    Filesize

    128KB

  • memory/2692-71-0x0000000006080000-0x00000000060F8000-memory.dmp

    Filesize

    480KB

  • memory/2692-69-0x0000000006000000-0x0000000006078000-memory.dmp

    Filesize

    480KB

  • memory/2692-527-0x0000000006000000-0x0000000006078000-memory.dmp

    Filesize

    480KB

  • memory/2692-528-0x0000000010000000-0x0000000010040000-memory.dmp

    Filesize

    256KB

  • memory/2692-60-0x0000000005C70000-0x0000000005C7A000-memory.dmp

    Filesize

    40KB

  • memory/2692-61-0x0000000005C70000-0x0000000005C7A000-memory.dmp

    Filesize

    40KB

  • memory/2692-53-0x0000000000400000-0x0000000000940000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-52-0x0000000005C20000-0x0000000005C8A000-memory.dmp

    Filesize

    424KB

  • memory/2692-43-0x0000000002820000-0x000000000283C000-memory.dmp

    Filesize

    112KB

  • memory/2692-35-0x0000000002820000-0x0000000002840000-memory.dmp

    Filesize

    128KB

  • memory/2692-28-0x0000000000400000-0x00000000008FA000-memory.dmp

    Filesize

    5.0MB

  • memory/2692-27-0x0000000073ECE000-0x0000000073ECF000-memory.dmp

    Filesize

    4KB

  • memory/2692-26-0x0000000077280000-0x0000000077281000-memory.dmp

    Filesize

    4KB

  • memory/2692-25-0x0000000000400000-0x0000000000940000-memory.dmp

    Filesize

    5.2MB