Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 06:12

General

  • Target

    d4aa07253504503adbe12331ee6149b6.exe

  • Size

    15KB

  • MD5

    d4aa07253504503adbe12331ee6149b6

  • SHA1

    0cc08ce3b73d40946c1b6fbc89000e927269ee97

  • SHA256

    cea50bb5162cb062f9c1bb03ce6a5d59b2247d0fbeec76e47948b1f90fe5f7cc

  • SHA512

    73b0e39becc8c952e2dd79eba0c4392241fc3791c4dd5657153eed20b006e8bee03ecc924c00160de5b70095d84924d3406cef17b261c317dd753c1be611a039

  • SSDEEP

    384:nopx1TLpuWfBB7x+zbtBc1XyaWTQFPDsyhLWtPpxtfUKTW:418WJ8b4myhitPH9

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

82.147.85.198:9180

Signatures

  • Detect ZGRat V1 34 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4aa07253504503adbe12331ee6149b6.exe
    "C:\Users\Admin\AppData\Local\Temp\d4aa07253504503adbe12331ee6149b6.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3316
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\d4aa07253504503adbe12331ee6149b6.exe'; Add-MpPreference -ExclusionProcess 'd4aa07253504503adbe12331ee6149b6'; Add-MpPreference -ExclusionPath 'C:\Users\Admin'"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4828
    • C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe
      "C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe
        C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe.log

    Filesize

    927B

    MD5

    4a911455784f74e368a4c2c7876d76f4

    SHA1

    a1700a0849ffb4f26671eb76da2489946b821c34

    SHA256

    264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c

    SHA512

    4617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d

  • C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe

    Filesize

    7KB

    MD5

    284735167d2dbb2028dc0be13df3051a

    SHA1

    d2a4c5f9d7eaaf99a92af590907e91cfdd327f77

    SHA256

    728774277776d754cdb47900f0118ca7272b1eef2b202ccef5ba9244e85a02c8

    SHA512

    359cc8c93743c2ab0b910404374267f853551d228c7246c71aef579520a246b5d0a794b237529dfce2c6dd176c21da83d7305c10f069e48c2f63ea69673a04cd

  • C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe

    Filesize

    1.4MB

    MD5

    8e18148ea33925b60b9e51c616a3ef79

    SHA1

    b4b9a5b84ae0bd852d35202f574bfbaaad653139

    SHA256

    cacaee72f6a0046b95c7abc3a454a8b09c4f95f6ac04418f05c857554f74e1e4

    SHA512

    5e5055fe6e385381e8a4e4fba299ed5224e9e3f1008012dd0f45e7a1495d02c7ff20edf48be7d9c6262eaa67178be37ab7d588e809a980f8cb9aa2ef0cd7511c

  • C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe

    Filesize

    435KB

    MD5

    ee0af604daf8d758d1ab15bd6f617399

    SHA1

    f7327bae288d8414ba3b3ae0bb0cd500a959b950

    SHA256

    b9d072cc2c7d980989945f52396b102ba5c1233874201c2d2e6d417a2bec1aa8

    SHA512

    620e81b560752ab9f2d76b9ecbb2d99a8738f1a2af29e2917c434306f0e2616aeb8659bd87628d1dd913e6a8b5a2535ff7c17787e72d186801557b9a7a942d3f

  • C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe

    Filesize

    1.2MB

    MD5

    f963421c268b4a7767da7fd255c59698

    SHA1

    0db97a95560be775d8f45fca1da1afdf50226712

    SHA256

    caa8ff006d66d59881e0d3463a8fac162e3b1059f9adfb793a561efb5e6214d2

    SHA512

    d2fe2a145c82660ce7fff3ec268e640ac3d28ca07ee8742f2bfc34c418fe59524f9980b44b25a58f3e267b03e707e6abe694fddc5434d29d90180fc8621966dd

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dcvmtfk1.gss.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmp2070.tmp

    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp2094.tmp

    Filesize

    90KB

    MD5

    f917ffa92d8bfadf17cf86d4e533e051

    SHA1

    ef1e1d4ff536ffc78644744249d406a38f6bec6a

    SHA256

    59f11e776375f1d6ced6bae31201f93e742dac78ef307b8a4205ad54a24160de

    SHA512

    bcd84610ea0a4fbd2abee81ef937ef0b781dbc084aa5378998308a89b32883a0c3dafc2c1ad11ce7f79943a76b99a34309fb25d8cbeae8ea62ba88fe7805f27e

  • C:\Users\Admin\AppData\Local\Temp\tmp20C0.tmp

    Filesize

    30KB

    MD5

    e970cb299ada3af3a614f0307aae52bd

    SHA1

    54fd84e5c4b3dd2d223d534a4b0b420b0ab6ce6f

    SHA256

    3f9021b6eb49e344ea2fdb5d4096fed563e05d94b3aa4115d5684c734104c5aa

    SHA512

    df0ed4bba6824efc3115a55860c5ccc71b69431def749cdc97251061365b65172d659c78af7044a934358624b48ff69a2e3acf6d12ab616c2e23d0a6f9872c5f

  • C:\Users\Admin\AppData\Local\Temp\tmp20D6.tmp

    Filesize

    20KB

    MD5

    49693267e0adbcd119f9f5e02adf3a80

    SHA1

    3ba3d7f89b8ad195ca82c92737e960e1f2b349df

    SHA256

    d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

    SHA512

    b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

  • C:\Users\Admin\AppData\Local\Temp\tmp20EC.tmp

    Filesize

    73KB

    MD5

    760ba774d292fc4af7022bff85033b7a

    SHA1

    071d8498c40e504ea46d279126d5c0e64d964b95

    SHA256

    e64d5eba30fdf8ad3ae667603eb7370152fc3d1ef9e5396d4215fd72e86c2869

    SHA512

    4413a56131e8b29a40966bb605a51bebb9070291cefe0df4c0a5053830ab20d602d0fe3f26d3c1bf6d34dab4b52235f2e35a3f6f806985c7ba627f39be9824dd

  • C:\Users\Admin\AppData\Local\Temp\tmp2107.tmp

    Filesize

    40KB

    MD5

    e8a576e26c44eca1543aa8648d61f9bd

    SHA1

    22678c379d152c85e80fad1bc1ac97334783fb6b

    SHA256

    913de95b5b83847726bc873870d08d9b8c15db591aeb887f742fef30a0b19d53

    SHA512

    1786990f731cba14f87ab9a2ce3bcd3ed65a52e35c9aa6ab09766dc8e0bc3bef1e2bc190584092d85a662ed07b5964ce41dea741de185688cfccba9265de2c71

  • memory/2064-1025-0x0000000006690000-0x0000000006706000-memory.dmp

    Filesize

    472KB

  • memory/2064-1026-0x0000000006890000-0x00000000068AE000-memory.dmp

    Filesize

    120KB

  • memory/2064-1023-0x00000000064C0000-0x0000000006682000-memory.dmp

    Filesize

    1.8MB

  • memory/2064-1022-0x00000000051E0000-0x00000000052EA000-memory.dmp

    Filesize

    1.0MB

  • memory/2064-1020-0x0000000004F80000-0x0000000004FCC000-memory.dmp

    Filesize

    304KB

  • memory/2064-1021-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/2064-1019-0x0000000004F40000-0x0000000004F7C000-memory.dmp

    Filesize

    240KB

  • memory/2064-1024-0x0000000006BC0000-0x00000000070EC000-memory.dmp

    Filesize

    5.2MB

  • memory/2064-1018-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/2064-1017-0x00000000054A0000-0x0000000005AB8000-memory.dmp

    Filesize

    6.1MB

  • memory/2064-1015-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2064-1016-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/2064-1196-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/2064-1197-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/2064-1198-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/2172-108-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-132-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-1014-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/2172-1008-0x0000000005300000-0x0000000005338000-memory.dmp

    Filesize

    224KB

  • memory/2172-1009-0x0000000005370000-0x00000000053BC000-memory.dmp

    Filesize

    304KB

  • memory/2172-1007-0x0000000002B20000-0x0000000002B21000-memory.dmp

    Filesize

    4KB

  • memory/2172-106-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-110-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-112-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-114-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-120-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-122-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-124-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-67-0x00000000006E0000-0x0000000000840000-memory.dmp

    Filesize

    1.4MB

  • memory/2172-69-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/2172-71-0x0000000005100000-0x00000000051A2000-memory.dmp

    Filesize

    648KB

  • memory/2172-128-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-73-0x00000000051A0000-0x0000000005242000-memory.dmp

    Filesize

    648KB

  • memory/2172-72-0x0000000002B00000-0x0000000002B10000-memory.dmp

    Filesize

    64KB

  • memory/2172-74-0x0000000005240000-0x00000000052E0000-memory.dmp

    Filesize

    640KB

  • memory/2172-75-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-78-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-76-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-80-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-82-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-90-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-96-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-98-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-100-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-102-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-94-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-92-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-88-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-86-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-84-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-104-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-116-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-118-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-126-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-130-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-138-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-136-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/2172-134-0x0000000005240000-0x00000000052DA000-memory.dmp

    Filesize

    616KB

  • memory/3316-50-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/3316-70-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/3316-1-0x0000000000C60000-0x0000000000C6A000-memory.dmp

    Filesize

    40KB

  • memory/3316-2-0x0000000005D10000-0x00000000062B4000-memory.dmp

    Filesize

    5.6MB

  • memory/3316-3-0x0000000005640000-0x00000000056D2000-memory.dmp

    Filesize

    584KB

  • memory/3316-55-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/3316-54-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/3316-53-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/3316-0-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/3316-52-0x00000000067C0000-0x00000000067CA000-memory.dmp

    Filesize

    40KB

  • memory/3316-51-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/4828-46-0x0000000007DC0000-0x0000000007DC8000-memory.dmp

    Filesize

    32KB

  • memory/4828-22-0x00000000067D0000-0x000000000681C000-memory.dmp

    Filesize

    304KB

  • memory/4828-41-0x0000000007D20000-0x0000000007DB6000-memory.dmp

    Filesize

    600KB

  • memory/4828-40-0x0000000007B10000-0x0000000007B1A000-memory.dmp

    Filesize

    40KB

  • memory/4828-39-0x0000000007AA0000-0x0000000007ABA000-memory.dmp

    Filesize

    104KB

  • memory/4828-38-0x00000000080F0000-0x000000000876A000-memory.dmp

    Filesize

    6.5MB

  • memory/4828-24-0x000000007F160000-0x000000007F170000-memory.dmp

    Filesize

    64KB

  • memory/4828-45-0x0000000007DE0000-0x0000000007DFA000-memory.dmp

    Filesize

    104KB

  • memory/4828-25-0x0000000007750000-0x0000000007782000-memory.dmp

    Filesize

    200KB

  • memory/4828-26-0x0000000070000000-0x000000007004C000-memory.dmp

    Filesize

    304KB

  • memory/4828-37-0x0000000007790000-0x0000000007833000-memory.dmp

    Filesize

    652KB

  • memory/4828-36-0x0000000006D50000-0x0000000006D6E000-memory.dmp

    Filesize

    120KB

  • memory/4828-23-0x0000000002FB0000-0x0000000002FC0000-memory.dmp

    Filesize

    64KB

  • memory/4828-49-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/4828-21-0x0000000006790000-0x00000000067AE000-memory.dmp

    Filesize

    120KB

  • memory/4828-20-0x00000000062D0000-0x0000000006624000-memory.dmp

    Filesize

    3.3MB

  • memory/4828-10-0x00000000060F0000-0x0000000006156000-memory.dmp

    Filesize

    408KB

  • memory/4828-9-0x0000000006080000-0x00000000060E6000-memory.dmp

    Filesize

    408KB

  • memory/4828-8-0x0000000005790000-0x00000000057B2000-memory.dmp

    Filesize

    136KB

  • memory/4828-7-0x0000000005960000-0x0000000005F88000-memory.dmp

    Filesize

    6.2MB

  • memory/4828-6-0x0000000002FB0000-0x0000000002FC0000-memory.dmp

    Filesize

    64KB

  • memory/4828-5-0x0000000074A50000-0x0000000075200000-memory.dmp

    Filesize

    7.7MB

  • memory/4828-4-0x0000000002E50000-0x0000000002E86000-memory.dmp

    Filesize

    216KB

  • memory/4828-44-0x0000000007CE0000-0x0000000007CF4000-memory.dmp

    Filesize

    80KB

  • memory/4828-43-0x0000000007CD0000-0x0000000007CDE000-memory.dmp

    Filesize

    56KB

  • memory/4828-42-0x0000000007CA0000-0x0000000007CB1000-memory.dmp

    Filesize

    68KB