Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 21:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe
-
Size
1.2MB
-
MD5
5ca9a656149a7690e6cf7bcc7309b3f0
-
SHA1
0e176c2c38a43ccc8cb1a83d8bb6f157ed0c1c23
-
SHA256
686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44d
-
SHA512
7abcafef7b88fcba6126f879740654e8266756c7b741761f7e856e3c99f9b539cfc58b80bc826a7b38283b05f634f45c5f8a9186574deae97255fe96db0fbc18
-
SSDEEP
24576:LaJd9N11Fk1VM+q2fv3BrUIQxgcEQXwBNtr:WzkPMYv3Br6ZDSt
Malware Config
Signatures
-
Detect ZGRat V2 1 IoCs
resource yara_rule behavioral1/memory/1316-5-0x0000000004E30000-0x0000000004F10000-memory.dmp family_zgrat_v2 -
Zgrat family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2264 1316 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2264 1316 686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe 28 PID 1316 wrote to memory of 2264 1316 686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe 28 PID 1316 wrote to memory of 2264 1316 686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe 28 PID 1316 wrote to memory of 2264 1316 686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe"C:\Users\Admin\AppData\Local\Temp\686725c54b6a1d65b14c836624e9dd0fbd4f66da544f5db2e2fbfaf2f770e44dN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 8482⤵
- Program crash
PID:2264
-