Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe
Resource
win10v2004-20240419-en
General
-
Target
f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe
-
Size
536KB
-
MD5
946ce9bbd3ec2564134ccde23c3870ad
-
SHA1
2053c03eb99bd9f97bf87cc2dae1d6e37e46aa8e
-
SHA256
f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c
-
SHA512
fa9e9c13356caaf47cd2548959ce3c376d3a865978885ac8f2c5355a680ea203517c4f2b2b830e05fe3cf5cc290d26ed5020fc3beee7357887509362ba7c5ce1
-
SSDEEP
12288:Ty90g489FMFZjIj6vXfEuixQUqr0DB62am9ElY:TyE89RgXMHRpA2aAElY
Malware Config
Signatures
-
Detect ZGRat V1 20 IoCs
resource yara_rule behavioral1/memory/1108-53-0x00000000049E0000-0x0000000004A1C000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-54-0x0000000005010000-0x000000000504A000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-63-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-90-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-87-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-85-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-83-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-82-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-79-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-77-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-75-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-73-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-72-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-69-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-67-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-65-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-61-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-59-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-57-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 behavioral1/memory/1108-56-0x0000000005010000-0x0000000005045000-memory.dmp family_zgrat_v1 -
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3636-12-0x00000000023A0000-0x00000000023BA000-memory.dmp healer behavioral1/memory/3636-14-0x0000000004B40000-0x0000000004B58000-memory.dmp healer behavioral1/memory/3636-15-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-24-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-42-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-40-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-38-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-37-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-34-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-32-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-30-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-28-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-26-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-22-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-20-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-18-0x0000000004B40000-0x0000000004B53000-memory.dmp healer behavioral1/memory/3636-16-0x0000000004B40000-0x0000000004B53000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 04447002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 04447002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 04447002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 04447002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 04447002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 04447002.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1108-53-0x00000000049E0000-0x0000000004A1C000-memory.dmp family_redline behavioral1/memory/1108-54-0x0000000005010000-0x000000000504A000-memory.dmp family_redline behavioral1/memory/1108-63-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-90-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-87-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-85-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-83-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-82-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-79-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-77-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-75-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-73-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-72-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-69-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-67-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-65-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-61-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-59-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-57-0x0000000005010000-0x0000000005045000-memory.dmp family_redline behavioral1/memory/1108-56-0x0000000005010000-0x0000000005045000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 17 IoCs
resource yara_rule behavioral1/memory/3636-12-0x00000000023A0000-0x00000000023BA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-14-0x0000000004B40000-0x0000000004B58000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-15-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-24-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-42-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-40-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-38-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-37-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-34-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-32-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-30-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-28-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-26-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-22-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-20-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-18-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3636-16-0x0000000004B40000-0x0000000004B53000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 20 IoCs
resource yara_rule behavioral1/memory/1108-53-0x00000000049E0000-0x0000000004A1C000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-54-0x0000000005010000-0x000000000504A000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-63-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-90-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-87-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-85-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-83-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-82-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-79-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-77-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-75-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-73-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-72-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-69-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-67-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-65-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-61-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-59-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-57-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1108-56-0x0000000005010000-0x0000000005045000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 2 IoCs
pid Process 3636 04447002.exe 1108 rk664141.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 04447002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 04447002.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2504 3636 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3636 04447002.exe 3636 04447002.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3636 04447002.exe Token: SeDebugPrivilege 1108 rk664141.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 536 wrote to memory of 3636 536 f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe 83 PID 536 wrote to memory of 3636 536 f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe 83 PID 536 wrote to memory of 3636 536 f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe 83 PID 536 wrote to memory of 1108 536 f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe 97 PID 536 wrote to memory of 1108 536 f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe 97 PID 536 wrote to memory of 1108 536 f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe"C:\Users\Admin\AppData\Local\Temp\f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\04447002.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\04447002.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 11003⤵
- Program crash
PID:2504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rk664141.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rk664141.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3636 -ip 36361⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD570fad5d9c3ad01581c79278f9c66d972
SHA1fb09bd9838bb98426271705ddd7a0f0c9e2584f3
SHA2562ebcf392616d2eb2128f1cce9f537dfc98783d1595806ac0be0959fea856211c
SHA51249c6550cde46e643754ea13bf8bfce59724e42cca08753956297f25b604d5ca89866718c66f1cc750158805fc7c74eb2f635bbb95d7d0049cbf0048813da60d8
-
Filesize
341KB
MD53ea494f11fa64d263fa40ef7b07c6c52
SHA1f44d0431f2a36645701e4b04509eaeb946e8e7e7
SHA25629779782e75937b7bb2e85096c1ee4b3a7db913b0b2991c583bb2e8918c8541c
SHA5124c1ba94a57ed4ec18be4ab91805eb574016e64953105d06c4ebf754f56411b03f7b475901a98e5f7e16885035618bedc01f79bf035adc33d9215359802530ff5