Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
d4aa07253504503adbe12331ee6149b6.exe
Resource
win7-20231215-en
General
-
Target
d4aa07253504503adbe12331ee6149b6.exe
-
Size
15KB
-
MD5
d4aa07253504503adbe12331ee6149b6
-
SHA1
0cc08ce3b73d40946c1b6fbc89000e927269ee97
-
SHA256
cea50bb5162cb062f9c1bb03ce6a5d59b2247d0fbeec76e47948b1f90fe5f7cc
-
SHA512
73b0e39becc8c952e2dd79eba0c4392241fc3791c4dd5657153eed20b006e8bee03ecc924c00160de5b70095d84924d3406cef17b261c317dd753c1be611a039
-
SSDEEP
384:nopx1TLpuWfBB7x+zbtBc1XyaWTQFPDsyhLWtPpxtfUKTW:418WJ8b4myhitPH9
Malware Config
Extracted
redline
cheat
82.147.85.198:9180
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/2172-74-0x0000000005240000-0x00000000052E0000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-75-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-78-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-76-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-80-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-82-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-90-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-96-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-98-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-100-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-102-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-94-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-92-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-88-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-86-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-84-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-104-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-116-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-118-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-126-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-132-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-138-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-136-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-134-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-130-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-128-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-124-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-122-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-120-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-114-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-112-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-110-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-108-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 behavioral2/memory/2172-106-0x0000000005240000-0x00000000052DA000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2064-1015-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/2064-1015-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d4aa07253504503adbe12331ee6149b6.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation d4aa07253504503adbe12331ee6149b6.exe -
Executes dropped EXE 2 IoCs
pid Process 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 2064 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d4aa07253504503adbe12331ee6149b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d4aa07253504503adbe12331ee6149b6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2172 set thread context of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3316 d4aa07253504503adbe12331ee6149b6.exe 4828 powershell.exe 4828 powershell.exe 4828 powershell.exe 2064 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 2064 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3316 d4aa07253504503adbe12331ee6149b6.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe Token: SeDebugPrivilege 2064 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4828 3316 d4aa07253504503adbe12331ee6149b6.exe 95 PID 3316 wrote to memory of 4828 3316 d4aa07253504503adbe12331ee6149b6.exe 95 PID 3316 wrote to memory of 4828 3316 d4aa07253504503adbe12331ee6149b6.exe 95 PID 3316 wrote to memory of 2172 3316 d4aa07253504503adbe12331ee6149b6.exe 110 PID 3316 wrote to memory of 2172 3316 d4aa07253504503adbe12331ee6149b6.exe 110 PID 3316 wrote to memory of 2172 3316 d4aa07253504503adbe12331ee6149b6.exe 110 PID 2172 wrote to memory of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 PID 2172 wrote to memory of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 PID 2172 wrote to memory of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 PID 2172 wrote to memory of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 PID 2172 wrote to memory of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 PID 2172 wrote to memory of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 PID 2172 wrote to memory of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 PID 2172 wrote to memory of 2064 2172 5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe 113 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d4aa07253504503adbe12331ee6149b6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4aa07253504503adbe12331ee6149b6.exe"C:\Users\Admin\AppData\Local\Temp\d4aa07253504503adbe12331ee6149b6.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\d4aa07253504503adbe12331ee6149b6.exe'; Add-MpPreference -ExclusionProcess 'd4aa07253504503adbe12331ee6149b6'; Add-MpPreference -ExclusionPath 'C:\Users\Admin'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe"C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exeC:\Users\Admin\AppData\Local\Temp\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5f9f1bfa-1ea7-499a-b17f-51c122494bb8.exe.log
Filesize927B
MD54a911455784f74e368a4c2c7876d76f4
SHA1a1700a0849ffb4f26671eb76da2489946b821c34
SHA256264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c
SHA5124617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d
-
Filesize
7KB
MD5284735167d2dbb2028dc0be13df3051a
SHA1d2a4c5f9d7eaaf99a92af590907e91cfdd327f77
SHA256728774277776d754cdb47900f0118ca7272b1eef2b202ccef5ba9244e85a02c8
SHA512359cc8c93743c2ab0b910404374267f853551d228c7246c71aef579520a246b5d0a794b237529dfce2c6dd176c21da83d7305c10f069e48c2f63ea69673a04cd
-
Filesize
1.4MB
MD58e18148ea33925b60b9e51c616a3ef79
SHA1b4b9a5b84ae0bd852d35202f574bfbaaad653139
SHA256cacaee72f6a0046b95c7abc3a454a8b09c4f95f6ac04418f05c857554f74e1e4
SHA5125e5055fe6e385381e8a4e4fba299ed5224e9e3f1008012dd0f45e7a1495d02c7ff20edf48be7d9c6262eaa67178be37ab7d588e809a980f8cb9aa2ef0cd7511c
-
Filesize
435KB
MD5ee0af604daf8d758d1ab15bd6f617399
SHA1f7327bae288d8414ba3b3ae0bb0cd500a959b950
SHA256b9d072cc2c7d980989945f52396b102ba5c1233874201c2d2e6d417a2bec1aa8
SHA512620e81b560752ab9f2d76b9ecbb2d99a8738f1a2af29e2917c434306f0e2616aeb8659bd87628d1dd913e6a8b5a2535ff7c17787e72d186801557b9a7a942d3f
-
Filesize
1.2MB
MD5f963421c268b4a7767da7fd255c59698
SHA10db97a95560be775d8f45fca1da1afdf50226712
SHA256caa8ff006d66d59881e0d3463a8fac162e3b1059f9adfb793a561efb5e6214d2
SHA512d2fe2a145c82660ce7fff3ec268e640ac3d28ca07ee8742f2bfc34c418fe59524f9980b44b25a58f3e267b03e707e6abe694fddc5434d29d90180fc8621966dd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
90KB
MD5f917ffa92d8bfadf17cf86d4e533e051
SHA1ef1e1d4ff536ffc78644744249d406a38f6bec6a
SHA25659f11e776375f1d6ced6bae31201f93e742dac78ef307b8a4205ad54a24160de
SHA512bcd84610ea0a4fbd2abee81ef937ef0b781dbc084aa5378998308a89b32883a0c3dafc2c1ad11ce7f79943a76b99a34309fb25d8cbeae8ea62ba88fe7805f27e
-
Filesize
30KB
MD5e970cb299ada3af3a614f0307aae52bd
SHA154fd84e5c4b3dd2d223d534a4b0b420b0ab6ce6f
SHA2563f9021b6eb49e344ea2fdb5d4096fed563e05d94b3aa4115d5684c734104c5aa
SHA512df0ed4bba6824efc3115a55860c5ccc71b69431def749cdc97251061365b65172d659c78af7044a934358624b48ff69a2e3acf6d12ab616c2e23d0a6f9872c5f
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
73KB
MD5760ba774d292fc4af7022bff85033b7a
SHA1071d8498c40e504ea46d279126d5c0e64d964b95
SHA256e64d5eba30fdf8ad3ae667603eb7370152fc3d1ef9e5396d4215fd72e86c2869
SHA5124413a56131e8b29a40966bb605a51bebb9070291cefe0df4c0a5053830ab20d602d0fe3f26d3c1bf6d34dab4b52235f2e35a3f6f806985c7ba627f39be9824dd
-
Filesize
40KB
MD5e8a576e26c44eca1543aa8648d61f9bd
SHA122678c379d152c85e80fad1bc1ac97334783fb6b
SHA256913de95b5b83847726bc873870d08d9b8c15db591aeb887f742fef30a0b19d53
SHA5121786990f731cba14f87ab9a2ce3bcd3ed65a52e35c9aa6ab09766dc8e0bc3bef1e2bc190584092d85a662ed07b5964ce41dea741de185688cfccba9265de2c71