Analysis
-
max time kernel
142s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe
Resource
win7-20231023-en
General
-
Target
73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe
-
Size
360KB
-
MD5
f2132f3b2846e6db8aa669cba44a6ce6
-
SHA1
e54356467c64da47030168426c802002365dedd8
-
SHA256
73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8
-
SHA512
d52fdfa5a665af291f0c615614c565bcd0baf453111ec63469c39db7145b7fcbc10ad9f3e31c06436efc7b0182c8d28781c8d9658c3033d8ebb1c162a1563668
-
SSDEEP
6144:lU66fEZXq4yTWN8cRfiEAJnixtj1i+Ndoia1Ag7tiobX+pbvxDf:dZXJyREAcbhCirm5L+tv
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral2/memory/552-6-0x0000000002990000-0x00000000029EA000-memory.dmp family_zgrat_v1 behavioral2/memory/552-8-0x0000000004F90000-0x0000000004FEA000-memory.dmp family_zgrat_v1 behavioral2/memory/552-10-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-11-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-13-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-15-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-17-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-19-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-21-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-23-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-25-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-27-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-29-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-31-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-33-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-37-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-39-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-35-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-41-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-43-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-45-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-47-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-49-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-51-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-53-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-55-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-57-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-59-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-61-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-63-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-65-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-67-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-69-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-71-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 behavioral2/memory/552-73-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/552-6-0x0000000002990000-0x00000000029EA000-memory.dmp family_redline behavioral2/memory/552-8-0x0000000004F90000-0x0000000004FEA000-memory.dmp family_redline behavioral2/memory/552-10-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-11-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-13-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-15-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-17-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-19-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-21-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-23-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-25-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-27-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-29-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-31-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-33-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-37-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-39-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-35-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-41-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-43-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-45-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-47-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-49-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-51-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-53-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-55-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-57-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-59-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-61-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-63-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-65-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-67-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-69-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-71-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline behavioral2/memory/552-73-0x0000000004F90000-0x0000000004FE3000-memory.dmp family_redline -
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/552-6-0x0000000002990000-0x00000000029EA000-memory.dmp net_reactor behavioral2/memory/552-8-0x0000000004F90000-0x0000000004FEA000-memory.dmp net_reactor behavioral2/memory/552-10-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-11-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-13-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-15-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-17-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-19-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-21-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-23-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-25-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-27-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-29-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-31-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-33-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-37-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-39-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-35-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-41-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-43-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-45-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-47-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-49-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-51-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-53-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-55-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-57-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-59-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-61-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-63-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-65-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-67-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-69-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-71-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor behavioral2/memory/552-73-0x0000000004F90000-0x0000000004FE3000-memory.dmp net_reactor -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 552 73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe 552 73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe 552 73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe 552 73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe 552 73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe 552 73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 552 73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe"C:\Users\Admin\AppData\Local\Temp\73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552