Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe
Resource
win10v2004-20240412-en
General
-
Target
4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe
-
Size
763KB
-
MD5
967f668de8d3e75e28cb67dd87b00e6d
-
SHA1
4d925e0b437374d34beda4ec6c022ec79e60c3ad
-
SHA256
4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f
-
SHA512
d75e80c397096eee1f426593e54ffbe9999e222eb434603470d207a4c65f6102b40f8907b66622fcd9a2a29e4d1abadb3ca6594c71f7ea26a2114a2b40f9dc28
-
SSDEEP
12288:py90/l5R4cDwygXI0nX9jvkxK9X/MsJda7+fV7E762b8Jg15auk027W9Xx:py64UwygBxvWK9X0+fVw6oegCb027Ax
Malware Config
Signatures
-
Detect ZGRat V1 20 IoCs
resource yara_rule behavioral1/memory/3608-61-0x00000000027D0000-0x000000000280C000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-63-0x00000000028A0000-0x00000000028DA000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-64-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-66-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-71-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-74-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-76-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-78-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-80-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-82-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-84-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-86-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-88-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-90-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-92-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-94-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-96-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-98-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-100-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 behavioral1/memory/3608-102-0x00000000028A0000-0x00000000028D5000-memory.dmp family_zgrat_v1 -
Detects Healer an antivirus disabler dropper 18 IoCs
resource yara_rule behavioral1/memory/996-18-0x0000000002700000-0x000000000271A000-memory.dmp healer behavioral1/memory/996-20-0x0000000004E90000-0x0000000004EA0000-memory.dmp healer behavioral1/memory/996-23-0x0000000005490000-0x00000000054A8000-memory.dmp healer behavioral1/memory/996-24-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-25-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-27-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-29-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-31-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-33-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-35-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-37-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-39-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-41-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-43-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-45-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-47-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-49-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral1/memory/996-51-0x0000000005490000-0x00000000054A2000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr419417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr419417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr419417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr419417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr419417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr419417.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3608-61-0x00000000027D0000-0x000000000280C000-memory.dmp family_redline behavioral1/memory/3608-63-0x00000000028A0000-0x00000000028DA000-memory.dmp family_redline behavioral1/memory/3608-64-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-66-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-71-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-74-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-76-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-78-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-80-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-82-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-84-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-86-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-88-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-90-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-92-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-94-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-96-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-98-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-100-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline behavioral1/memory/3608-102-0x00000000028A0000-0x00000000028D5000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 18 IoCs
resource yara_rule behavioral1/memory/996-18-0x0000000002700000-0x000000000271A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-20-0x0000000004E90000-0x0000000004EA0000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-23-0x0000000005490000-0x00000000054A8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-24-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-25-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-27-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-29-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-31-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-33-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-35-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-37-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-39-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-41-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-43-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-45-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-47-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-49-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/996-51-0x0000000005490000-0x00000000054A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 20 IoCs
resource yara_rule behavioral1/memory/3608-61-0x00000000027D0000-0x000000000280C000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-63-0x00000000028A0000-0x00000000028DA000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-64-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-66-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-71-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-74-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-76-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-78-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-80-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-82-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-84-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-86-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-88-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-90-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-92-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-94-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-96-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-98-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-100-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3608-102-0x00000000028A0000-0x00000000028D5000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 3 IoCs
pid Process 4824 un430773.exe 996 pr419417.exe 3608 qu615041.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr419417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr419417.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un430773.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4984 996 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 996 pr419417.exe 996 pr419417.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 996 pr419417.exe Token: SeDebugPrivilege 3608 qu615041.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1628 wrote to memory of 4824 1628 4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe 84 PID 1628 wrote to memory of 4824 1628 4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe 84 PID 1628 wrote to memory of 4824 1628 4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe 84 PID 4824 wrote to memory of 996 4824 un430773.exe 85 PID 4824 wrote to memory of 996 4824 un430773.exe 85 PID 4824 wrote to memory of 996 4824 un430773.exe 85 PID 4824 wrote to memory of 3608 4824 un430773.exe 98 PID 4824 wrote to memory of 3608 4824 un430773.exe 98 PID 4824 wrote to memory of 3608 4824 un430773.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe"C:\Users\Admin\AppData\Local\Temp\4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430773.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430773.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr419417.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr419417.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 10844⤵
- Program crash
PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu615041.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu615041.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 996 -ip 9961⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD595c2f07de62707ccea6b7e533d555b9c
SHA1b9f74ebcb4ea24da447d749cd1f2359893e94295
SHA256b0da38ff55e368cb06c4046310521c0a885b2f6041d09e0c30ac412684893c8f
SHA512d82ba4713aa86c4061ed627e09a6a495f7afdec2509ef28b702967b80b97c0c41f480ed4a0b3379d78544740e1548a39aca0e705dbf97a9ff84a791bee3a5f22
-
Filesize
403KB
MD53b36bd6ba6590e82b14ede8a286837e0
SHA128879a6fb664df3f803f00e4cedaec347eec44d9
SHA2566f0ea29d4d1a1b731f855b97fcc96075e02e92eef6d9c510be0015ad02e0cf44
SHA512a53978fa3076fc377d265a3c337c4a21ee5da82a56ae2d2d161d55abd7a43cd55f6ed00dcd9c6e2d8c6110cdaeb1115dab0f68f6b9c9b1e74bfcfa06543e4316
-
Filesize
486KB
MD5c16593624a62a1894cc4f1953e4feb63
SHA11662e87cc81480117f9f2e04ee00b0270a3016f0
SHA256cd9daef60b56c767b32dbd8ff48c8b45e6a93dfc7d312b0d7439a4bda404b0c0
SHA51247789c60e380eaac5f0386d362b1ec28bcfda8da8f5147cd85f3319c47a064e6b7266b149f3332c0f7e5bbdb8498ac44f327c8a9376effc33802e60cb4ea6a93