Resubmissions

27-01-2024 14:29

240127-rtsdmsfggl 10

27-01-2024 14:26

240127-rr6hgsfgdr 10

Analysis

  • max time kernel
    133s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2024 14:29

General

  • Target

    driver1.exe

  • Size

    513KB

  • MD5

    ecd563c8ea2125310eada2daac93251a

  • SHA1

    1d8e53b0d094b51f5db03d8bdffbeafde33ddaf0

  • SHA256

    77fbf732a2e1869f995d5d5d38a1ac0b35edba9a83ed557d8abb45dec9bbd604

  • SHA512

    be722be655e3ec4aef28651f9fe21cfa48af3abe2aa2c8158e991d75115bcaf8ceebf31737c54cae565c86fa275c252bf68dae5cb2e257c232cea7e61277bece

  • SSDEEP

    6144:Vy55yyymLLkkGGt/+9bBfgcqVXCtKPIszeQYsqRCbIW/Ib4YzCm/Db+3Hsj0OrPJ:VL2yttQYsqREcYmL63MoWyw/539HDn

Malware Config

Signatures

  • Detect ZGRat V1 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\driver1.exe
    "C:\Users\Admin\AppData\Local\Temp\driver1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"
        3⤵
        • Executes dropped EXE
        PID:2780
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2964
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe

      Filesize

      4KB

      MD5

      a5ce3aba68bdb438e98b1d0c70a3d95c

      SHA1

      013f5aa9057bf0b3c0c24824de9d075434501354

      SHA256

      9b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a

      SHA512

      7446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79

    • memory/1404-16-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1404-7-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1404-19-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1404-6-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1404-14-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1404-8-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1404-10-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1404-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2184-20-0x0000000074BF0000-0x00000000752DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2184-0-0x0000000001240000-0x00000000012C6000-memory.dmp

      Filesize

      536KB

    • memory/2184-5-0x00000000026D0000-0x00000000046D0000-memory.dmp

      Filesize

      32.0MB

    • memory/2184-1-0x0000000074BF0000-0x00000000752DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2184-2-0x0000000004E00000-0x0000000004E40000-memory.dmp

      Filesize

      256KB

    • memory/2780-27-0x0000000000320000-0x0000000000328000-memory.dmp

      Filesize

      32KB

    • memory/2780-28-0x000007FEF5C00000-0x000007FEF65EC000-memory.dmp

      Filesize

      9.9MB

    • memory/2780-29-0x000007FEF5C00000-0x000007FEF65EC000-memory.dmp

      Filesize

      9.9MB

    • memory/2964-31-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2964-30-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2964-32-0x0000000002F50000-0x0000000002F60000-memory.dmp

      Filesize

      64KB

    • memory/2964-33-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2964-34-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB