Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-05-2024 09:27
Behavioral task
behavioral1
Sample
f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe
Resource
win11-20240426-en
General
-
Target
f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe
-
Size
260KB
-
MD5
ff3fb9bb9fa750c86097dc6da5ffdcc5
-
SHA1
3a30f704a8d12c459a9d697a0b77d96de633249c
-
SHA256
f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3
-
SHA512
b1b7dd69b69bd6b944da9bf934c4eb8653ad7c6e2f6b80369b3258d5eb738a76809576102eca7fcaf4dbe6d346c3ec2864e2584d6643ad4b56b7d2cc5a65a881
-
SSDEEP
3072:bI0qv0Seb3m47JB3Zt/FBsyY30wmk1AnvA0nUsCwNGPt+5OnHDc2N1HIsdN6UxF:Hqv0zb3PJz+BAnY0nd7sV+5KDc6bf
Malware Config
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/3704-1-0x0000000000E30000-0x0000000000E74000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3576-4-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3704 set thread context of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe 3576 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3576 RegAsm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3704 wrote to memory of 1040 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 80 PID 3704 wrote to memory of 1040 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 80 PID 3704 wrote to memory of 1040 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 80 PID 3704 wrote to memory of 4636 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 81 PID 3704 wrote to memory of 4636 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 81 PID 3704 wrote to memory of 4636 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 81 PID 3704 wrote to memory of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82 PID 3704 wrote to memory of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82 PID 3704 wrote to memory of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82 PID 3704 wrote to memory of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82 PID 3704 wrote to memory of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82 PID 3704 wrote to memory of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82 PID 3704 wrote to memory of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82 PID 3704 wrote to memory of 3576 3704 f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe"C:\Users\Admin\AppData\Local\Temp\f3726354e28831c42bf1f24e79f02906b7ef038815351ed2b6ff0d769a99c8a3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-