Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe
Resource
win10v2004-20240412-en
General
-
Target
7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe
-
Size
696KB
-
MD5
4ca06158407b9d95c86f42dbb09487f4
-
SHA1
d16920e8b6a12e631d3be57be69d2038f1236813
-
SHA256
7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354
-
SHA512
1b0f9cc86ae32c4789349edaa17b75b8dde3e500a97b32db5c55db4d4ca8bbc17c5aa4dbc5ea0bfc89ca6d8267bd21754236bb0e4e09de1bc84428d7fe005324
-
SSDEEP
12288:jy90CgQx7nUfjX/OPqVQqT3hxKjOuYYEcYrUHVJH4:jyBKjX/OSVlD9uY12s
Malware Config
Signatures
-
Detect ZGRat V1 20 IoCs
resource yara_rule behavioral1/memory/2352-61-0x0000000004940000-0x000000000497C000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-63-0x0000000004B20000-0x0000000004B5A000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-64-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-65-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-67-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-74-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-71-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-77-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-79-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-83-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-81-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-85-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-87-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-89-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-91-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-93-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-95-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-97-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-99-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 behavioral1/memory/2352-101-0x0000000004B20000-0x0000000004B55000-memory.dmp family_zgrat_v1 -
Detects Healer an antivirus disabler dropper 18 IoCs
resource yara_rule behavioral1/memory/1068-17-0x0000000004BC0000-0x0000000004BDA000-memory.dmp healer behavioral1/memory/1068-19-0x0000000004C50000-0x0000000004C68000-memory.dmp healer behavioral1/memory/1068-21-0x0000000007210000-0x0000000007220000-memory.dmp healer behavioral1/memory/1068-24-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-23-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-26-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-29-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-31-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-33-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-35-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-37-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-39-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-41-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-43-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-45-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-47-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-49-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1068-51-0x0000000004C50000-0x0000000004C62000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr399239.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr399239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr399239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr399239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr399239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr399239.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2352-61-0x0000000004940000-0x000000000497C000-memory.dmp family_redline behavioral1/memory/2352-63-0x0000000004B20000-0x0000000004B5A000-memory.dmp family_redline behavioral1/memory/2352-64-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-65-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-67-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-74-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-71-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-77-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-79-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-83-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-81-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-85-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-87-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-89-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-91-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-93-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-95-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-97-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-99-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline behavioral1/memory/2352-101-0x0000000004B20000-0x0000000004B55000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 18 IoCs
resource yara_rule behavioral1/memory/1068-17-0x0000000004BC0000-0x0000000004BDA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-19-0x0000000004C50000-0x0000000004C68000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-21-0x0000000007210000-0x0000000007220000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-24-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-23-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-26-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-29-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-31-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-33-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-35-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-37-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-39-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-41-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-43-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-45-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-47-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-49-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1068-51-0x0000000004C50000-0x0000000004C62000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 20 IoCs
resource yara_rule behavioral1/memory/2352-61-0x0000000004940000-0x000000000497C000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-63-0x0000000004B20000-0x0000000004B5A000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-64-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-65-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-67-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-74-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-71-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-77-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-79-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-83-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-81-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-85-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-87-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-89-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-91-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-93-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-95-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-97-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-99-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2352-101-0x0000000004B20000-0x0000000004B55000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 3 IoCs
pid Process 3604 un639802.exe 1068 pr399239.exe 2352 qu051503.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr399239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr399239.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un639802.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1236 1068 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1068 pr399239.exe 1068 pr399239.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1068 pr399239.exe Token: SeDebugPrivilege 2352 qu051503.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3604 3156 7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe 87 PID 3156 wrote to memory of 3604 3156 7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe 87 PID 3156 wrote to memory of 3604 3156 7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe 87 PID 3604 wrote to memory of 1068 3604 un639802.exe 88 PID 3604 wrote to memory of 1068 3604 un639802.exe 88 PID 3604 wrote to memory of 1068 3604 un639802.exe 88 PID 3604 wrote to memory of 2352 3604 un639802.exe 101 PID 3604 wrote to memory of 2352 3604 un639802.exe 101 PID 3604 wrote to memory of 2352 3604 un639802.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe"C:\Users\Admin\AppData\Local\Temp\7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un639802.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un639802.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr399239.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr399239.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 10804⤵
- Program crash
PID:1236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu051503.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu051503.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1068 -ip 10681⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD500878ae94239027c6ac0ce0456c9a361
SHA154f29558ab5f63bf62a4a83e66f69d863eafe4fb
SHA25601b702685250315679d5eb07cde349e2410e2acd7c2c2678b53f9eb99a50ff2e
SHA512ba477fef4c1996c60b6d7fdc958bba53e9c3da9d82f5030dec2cde287ae4841a94eb5bfb98d5b7b00813ce5b2449b45bc11e16a73fb4a3454571d1a0c20d6af8
-
Filesize
269KB
MD551760ce0e328ced19f6df0b15917e990
SHA151de00adfc945ff585e8748a19c73f51a3ce1851
SHA25641ea0044cbcb091b71e51cac039e51bd1f64b071240062f32c0f7dbd910f8cf1
SHA5120141440edd082d8f662a63dfcd54796b08145d578adcd7c9de37b12141ae342ae4999654ec466e7da3688e1938c1b0e440e769068968a91b019ca70622a50108
-
Filesize
351KB
MD5f91e92e49af44f1855c1d733f7407c09
SHA1e0893c65b0af985549de8d17e76712407527aa60
SHA256a4b94c14067a61e830a27d71ef0a2630a64b64f5dd59576ad5ed13cf0b4eefc5
SHA51268bef83cdc2a87260fb79bfa350777fab4935c3ef6fe68deeeab99729b692f5589ee53bec031383b6180f55cfe323bd89753e616d5979f51ddad9071ba3a4929