Analysis

  • max time kernel
    120s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 08:02

General

  • Target

    ae3d900e61024edd1664373cfecbbbf3.exe

  • Size

    3.0MB

  • MD5

    ae3d900e61024edd1664373cfecbbbf3

  • SHA1

    59ad6451b70817e53c43d5b5647339b4fec152db

  • SHA256

    4195dfa9caf444d8989a704eb6fac07dc7caff143ef054597652e1886eeebede

  • SHA512

    8cf15761068498c2135f684f45383edab082927aa83cfc8b979ad70412cc80be0b5ac4ee20b86a234b77f6b6f86aea22472dfc7daa3c5deab1ad528a6bc26fde

  • SSDEEP

    49152:rDbJcqrhOIqdoRpj8+tlw+3klfvT4FVYAmIpUtm8eW:rDzhhqoPtlwIkh2VY3IpVVW

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae3d900e61024edd1664373cfecbbbf3.exe
    "C:\Users\Admin\AppData\Local\Temp\ae3d900e61024edd1664373cfecbbbf3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\ae3d900e61024edd1664373cfecbbbf3.exe
      C:\Users\Admin\AppData\Local\Temp\ae3d900e61024edd1664373cfecbbbf3.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1588
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'ae3d900e61024edd1664373cfecbbbf3';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'ae3d900e61024edd1664373cfecbbbf3' -Value '"C:\Users\Admin\AppData\Roaming\ae3d900e61024edd1664373cfecbbbf3.exe"' -PropertyType 'String'
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:7740

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1588-4801-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/1588-10965-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/1588-4932-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/1588-4799-0x0000000000400000-0x0000000000474000-memory.dmp
    Filesize

    464KB

  • memory/1588-4800-0x0000000002300000-0x00000000023DA000-memory.dmp
    Filesize

    872KB

  • memory/2904-54-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-64-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-20-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-22-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-24-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-26-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-32-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-34-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-30-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-28-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-18-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-14-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-12-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-10-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-8-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-36-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-38-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-0-0x000000007436E000-0x000000007436F000-memory.dmp
    Filesize

    4KB

  • memory/2904-66-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-16-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-62-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-60-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-58-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-56-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-52-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-50-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-48-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-46-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-44-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-42-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-40-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-4780-0x0000000004D50000-0x0000000004D9C000-memory.dmp
    Filesize

    304KB

  • memory/2904-4779-0x0000000004CB0000-0x0000000004D4A000-memory.dmp
    Filesize

    616KB

  • memory/2904-4781-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/2904-4-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-3-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-6-0x00000000048F0000-0x0000000004B3C000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-2-0x00000000048F0000-0x0000000004B42000-memory.dmp
    Filesize

    2.3MB

  • memory/2904-4798-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/2904-1-0x00000000008E0000-0x0000000000BE4000-memory.dmp
    Filesize

    3.0MB