Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 21:53

General

  • Target

    4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe

  • Size

    763KB

  • MD5

    967f668de8d3e75e28cb67dd87b00e6d

  • SHA1

    4d925e0b437374d34beda4ec6c022ec79e60c3ad

  • SHA256

    4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f

  • SHA512

    d75e80c397096eee1f426593e54ffbe9999e222eb434603470d207a4c65f6102b40f8907b66622fcd9a2a29e4d1abadb3ca6594c71f7ea26a2114a2b40f9dc28

  • SSDEEP

    12288:py90/l5R4cDwygXI0nX9jvkxK9X/MsJda7+fV7E762b8Jg15auk027W9Xx:py64UwygBxvWK9X0+fVw6oegCb027Ax

Malware Config

Signatures

  • Detect ZGRat V1 20 IoCs
  • Detects Healer an antivirus disabler dropper 18 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 18 IoCs
  • Detects executables packed with ConfuserEx Mod 20 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe
    "C:\Users\Admin\AppData\Local\Temp\4fea0eda18fcd26278c500ad0a5a8b4220a5b39206612d2af69586cbdba3e43f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430773.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr419417.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr419417.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:996
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 1084
          4⤵
          • Program crash
          PID:4984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu615041.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu615041.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 996 -ip 996
    1⤵
      PID:3764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un430773.exe

      Filesize

      610KB

      MD5

      95c2f07de62707ccea6b7e533d555b9c

      SHA1

      b9f74ebcb4ea24da447d749cd1f2359893e94295

      SHA256

      b0da38ff55e368cb06c4046310521c0a885b2f6041d09e0c30ac412684893c8f

      SHA512

      d82ba4713aa86c4061ed627e09a6a495f7afdec2509ef28b702967b80b97c0c41f480ed4a0b3379d78544740e1548a39aca0e705dbf97a9ff84a791bee3a5f22

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr419417.exe

      Filesize

      403KB

      MD5

      3b36bd6ba6590e82b14ede8a286837e0

      SHA1

      28879a6fb664df3f803f00e4cedaec347eec44d9

      SHA256

      6f0ea29d4d1a1b731f855b97fcc96075e02e92eef6d9c510be0015ad02e0cf44

      SHA512

      a53978fa3076fc377d265a3c337c4a21ee5da82a56ae2d2d161d55abd7a43cd55f6ed00dcd9c6e2d8c6110cdaeb1115dab0f68f6b9c9b1e74bfcfa06543e4316

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu615041.exe

      Filesize

      486KB

      MD5

      c16593624a62a1894cc4f1953e4feb63

      SHA1

      1662e87cc81480117f9f2e04ee00b0270a3016f0

      SHA256

      cd9daef60b56c767b32dbd8ff48c8b45e6a93dfc7d312b0d7439a4bda404b0c0

      SHA512

      47789c60e380eaac5f0386d362b1ec28bcfda8da8f5147cd85f3319c47a064e6b7266b149f3332c0f7e5bbdb8498ac44f327c8a9376effc33802e60cb4ea6a93

    • memory/996-15-0x0000000000B20000-0x0000000000C20000-memory.dmp

      Filesize

      1024KB

    • memory/996-16-0x0000000000960000-0x000000000098D000-memory.dmp

      Filesize

      180KB

    • memory/996-17-0x0000000000400000-0x000000000080A000-memory.dmp

      Filesize

      4.0MB

    • memory/996-19-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/996-18-0x0000000002700000-0x000000000271A000-memory.dmp

      Filesize

      104KB

    • memory/996-20-0x0000000004E90000-0x0000000004EA0000-memory.dmp

      Filesize

      64KB

    • memory/996-21-0x0000000004E90000-0x0000000004EA0000-memory.dmp

      Filesize

      64KB

    • memory/996-22-0x0000000004EA0000-0x0000000005444000-memory.dmp

      Filesize

      5.6MB

    • memory/996-23-0x0000000005490000-0x00000000054A8000-memory.dmp

      Filesize

      96KB

    • memory/996-24-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-25-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-27-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-29-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-31-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-33-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-35-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-37-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-39-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-41-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-43-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-45-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-47-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-49-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-51-0x0000000005490000-0x00000000054A2000-memory.dmp

      Filesize

      72KB

    • memory/996-54-0x0000000000400000-0x000000000080A000-memory.dmp

      Filesize

      4.0MB

    • memory/996-55-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/3608-60-0x0000000000A00000-0x0000000000B00000-memory.dmp

      Filesize

      1024KB

    • memory/3608-61-0x00000000027D0000-0x000000000280C000-memory.dmp

      Filesize

      240KB

    • memory/3608-63-0x00000000028A0000-0x00000000028DA000-memory.dmp

      Filesize

      232KB

    • memory/3608-62-0x00000000024A0000-0x00000000024E6000-memory.dmp

      Filesize

      280KB

    • memory/3608-65-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/3608-64-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-67-0x0000000004F60000-0x0000000004F70000-memory.dmp

      Filesize

      64KB

    • memory/3608-68-0x0000000004F60000-0x0000000004F70000-memory.dmp

      Filesize

      64KB

    • memory/3608-66-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-71-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-73-0x0000000000400000-0x000000000081E000-memory.dmp

      Filesize

      4.1MB

    • memory/3608-74-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-70-0x0000000004F60000-0x0000000004F70000-memory.dmp

      Filesize

      64KB

    • memory/3608-76-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-78-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-80-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-82-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-84-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-86-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-88-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-90-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-92-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-94-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-96-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-98-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-100-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-102-0x00000000028A0000-0x00000000028D5000-memory.dmp

      Filesize

      212KB

    • memory/3608-861-0x00000000079A0000-0x0000000007FB8000-memory.dmp

      Filesize

      6.1MB

    • memory/3608-862-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/3608-863-0x0000000007FC0000-0x00000000080CA000-memory.dmp

      Filesize

      1.0MB

    • memory/3608-864-0x0000000004F60000-0x0000000004F70000-memory.dmp

      Filesize

      64KB

    • memory/3608-865-0x00000000080D0000-0x000000000810C000-memory.dmp

      Filesize

      240KB

    • memory/3608-866-0x00000000026D0000-0x000000000271C000-memory.dmp

      Filesize

      304KB

    • memory/3608-868-0x0000000000A00000-0x0000000000B00000-memory.dmp

      Filesize

      1024KB

    • memory/3608-870-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/3608-871-0x0000000004F60000-0x0000000004F70000-memory.dmp

      Filesize

      64KB

    • memory/3608-872-0x0000000004F60000-0x0000000004F70000-memory.dmp

      Filesize

      64KB

    • memory/3608-873-0x0000000004F60000-0x0000000004F70000-memory.dmp

      Filesize

      64KB

    • memory/3608-874-0x0000000004F60000-0x0000000004F70000-memory.dmp

      Filesize

      64KB