Analysis
-
max time kernel
160s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe
Resource
win10v2004-20240226-en
General
-
Target
02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe
-
Size
1.1MB
-
MD5
18365955fc5cf54859360be58dfb13cb
-
SHA1
743003a6bc293b9da446d6f8d69e1e61d54b751d
-
SHA256
02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b
-
SHA512
f1473fc3131a4239b7632bee17df41c5f7b8d3254a0095f318bdf7487701c3daa4452b8b2f3eb594efe312e3bb7e0538ce196d4094a24c89f817d7f430b35c40
-
SSDEEP
24576:+yxNAnwVU/LYfbpXf4+6fxgxDNXjbYtb0YUU+XSfY:NrAAGLYjpw+UxgLXjbS0YzIS
Malware Config
Signatures
-
Detect ZGRat V1 16 IoCs
resource yara_rule behavioral1/memory/6032-82-0x0000000002600000-0x000000000263C000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-86-0x00000000053C0000-0x00000000053FA000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-88-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-89-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-93-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-91-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-95-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-97-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-101-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-99-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-105-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-103-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-107-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-109-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-111-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 behavioral1/memory/6032-113-0x00000000053C0000-0x00000000053F5000-memory.dmp family_zgrat_v1 -
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2728-31-0x0000000002810000-0x000000000282A000-memory.dmp healer behavioral1/memory/2728-35-0x0000000004EE0000-0x0000000004EF8000-memory.dmp healer behavioral1/memory/2728-38-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-41-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-51-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-53-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-55-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-57-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-59-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-61-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-63-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2728-65-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr252586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr252586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr252586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr252586.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr252586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr252586.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 16 IoCs
resource yara_rule behavioral1/memory/6032-82-0x0000000002600000-0x000000000263C000-memory.dmp family_redline behavioral1/memory/6032-86-0x00000000053C0000-0x00000000053FA000-memory.dmp family_redline behavioral1/memory/6032-88-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-89-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-93-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-91-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-95-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-97-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-101-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-99-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-105-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-103-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-107-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-109-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-111-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline behavioral1/memory/6032-113-0x00000000053C0000-0x00000000053F5000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 17 IoCs
resource yara_rule behavioral1/memory/2728-31-0x0000000002810000-0x000000000282A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-35-0x0000000004EE0000-0x0000000004EF8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-38-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-41-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-51-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-53-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-55-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-57-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-59-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-61-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-63-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2728-65-0x0000000004EE0000-0x0000000004EF2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 16 IoCs
resource yara_rule behavioral1/memory/6032-82-0x0000000002600000-0x000000000263C000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-86-0x00000000053C0000-0x00000000053FA000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-88-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-89-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-93-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-91-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-95-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-97-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-101-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-99-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-105-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-103-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-107-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-109-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-111-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/6032-113-0x00000000053C0000-0x00000000053F5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 4 IoCs
pid Process 4992 un261859.exe 4972 un904329.exe 2728 pr252586.exe 6032 qu859873.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr252586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr252586.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un261859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un904329.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5156 2728 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 pr252586.exe 2728 pr252586.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2728 pr252586.exe Token: SeDebugPrivilege 6032 qu859873.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2620 wrote to memory of 4992 2620 02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe 91 PID 2620 wrote to memory of 4992 2620 02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe 91 PID 2620 wrote to memory of 4992 2620 02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe 91 PID 4992 wrote to memory of 4972 4992 un261859.exe 92 PID 4992 wrote to memory of 4972 4992 un261859.exe 92 PID 4992 wrote to memory of 4972 4992 un261859.exe 92 PID 4972 wrote to memory of 2728 4972 un904329.exe 93 PID 4972 wrote to memory of 2728 4972 un904329.exe 93 PID 4972 wrote to memory of 2728 4972 un904329.exe 93 PID 4972 wrote to memory of 6032 4972 un904329.exe 101 PID 4972 wrote to memory of 6032 4972 un904329.exe 101 PID 4972 wrote to memory of 6032 4972 un904329.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe"C:\Users\Admin\AppData\Local\Temp\02a69fcddc0e6a0b5febbcc68901d62d7f82e4fcf0a3bcb5355fc802c041954b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un261859.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un261859.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un904329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un904329.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr252586.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr252586.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 10925⤵
- Program crash
PID:5156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu859873.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu859873.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6032
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4044 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2728 -ip 27281⤵PID:4004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
763KB
MD59e76a180da41377ab75e93350967e049
SHA189e6c5efffcea5bab047883f3deb36fc94ab2429
SHA2561bcad8177412715d4fdf7dad1c68633486443dd530e237a304727286b519ad9d
SHA5126c3649d9fc832568a1593a026e72c681de1bd32f596a81702726a443737acb615097d57c79834cbcee6dc0d316fb31630c05f5336215e9b5d5b26d04ac4326b7
-
Filesize
609KB
MD55ee329d93dabba4aae89648096149013
SHA1ced4d20f147a1fab72b13b70f82b7130054a80d6
SHA256feeb693f6434349f72d197ae47b66d6ec69dfd354e71aec283c0ed336a8ca2c7
SHA512347b72589ca956cbadfc8eaaf2360ad3cdf41089d9355928a584dcc0e70e6bfc0174b55ce7f7eb1cca15b88287a03927b886f72463880e169a8c9da6eeac7966
-
Filesize
403KB
MD50d90b48be53630af10f2216c2e3d693d
SHA1b4fb895a9cbe96da29a79e9a75f0ca7e06be83c4
SHA256cf61600f64b1944567d683c172a9e858f5cfb4365d71e81f94a961f092f439e2
SHA5123e9915837d6799b6201cc95fbc7773980a7c7cb25655ecfa438d47905a3a1402de8e1b91ad2d07262501399d84f76d78bf874e0ab3590cdfc710ec950218b191
-
Filesize
486KB
MD5ac91da3bced0c29f9f27dcfab86535cf
SHA160e1c9dd592c401dbe62cb9e881c9c63a371cc20
SHA2563780198898eb1320d9c01f97e54d664a0e5a1558270b7e43e92be4729f44e8be
SHA5124572aa47418d30df5e0ffc794ada4134a39499e724a068290a57539462fbfdafc6b0c79d359ffb642d77f493d4d6f3b40feb3455d1707691230a192a0e6d7fd7