Analysis

  • max time kernel
    134s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2024 11:20

General

  • Target

    076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922.exe

  • Size

    260KB

  • MD5

    843da5c76b23673abbe86ed571fa4b9d

  • SHA1

    920df3ea434aad34f804dd11b524bd7e70b22891

  • SHA256

    076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922

  • SHA512

    012eddd2914273ab6190e2a81f0d3913feba93a214886a24f0af60e447313b378a6948645d1b40b92285ddba21a75bd66cc785f730c4a23e1e5acedce303b0ae

  • SSDEEP

    3072:TI0qv0Cb3v4eJB3ZOvfEszyp+X4nheAebX5uCUzqyHR1TZvVbeJVRr66UxF:fqv0Cb3lJzYf4nIN8BLHHbaLQ

Malware Config

Extracted

Family

redline

Botnet

5637482599

C2

https://pastebin.com/raw/NgsUAPya

Signatures

  • Detect ZGRat V1 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922.exe
    "C:\Users\Admin\AppData\Local\Temp\076a61ca946d4a08ec3b16c93f42c8ec29769d5b55ae47d833dbc1d6768df922.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2480-0-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

    Filesize

    4KB

  • memory/2480-1-0x00000000004B0000-0x00000000004F4000-memory.dmp

    Filesize

    272KB

  • memory/2480-25-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2480-7-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2636-14-0x0000000006070000-0x00000000060AC000-memory.dmp

    Filesize

    240KB

  • memory/2636-17-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/2636-10-0x0000000005800000-0x0000000005E18000-memory.dmp

    Filesize

    6.1MB

  • memory/2636-11-0x0000000005280000-0x0000000005292000-memory.dmp

    Filesize

    72KB

  • memory/2636-12-0x00000000053B0000-0x00000000054BA000-memory.dmp

    Filesize

    1.0MB

  • memory/2636-13-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2636-8-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2636-15-0x00000000060B0000-0x00000000060FC000-memory.dmp

    Filesize

    304KB

  • memory/2636-16-0x00000000063F0000-0x00000000065B2000-memory.dmp

    Filesize

    1.8MB

  • memory/2636-9-0x0000000004CF0000-0x0000000004D56000-memory.dmp

    Filesize

    408KB

  • memory/2636-18-0x00000000075D0000-0x0000000007B74000-memory.dmp

    Filesize

    5.6MB

  • memory/2636-19-0x00000000067B0000-0x0000000006842000-memory.dmp

    Filesize

    584KB

  • memory/2636-20-0x0000000006950000-0x00000000069C6000-memory.dmp

    Filesize

    472KB

  • memory/2636-21-0x0000000006780000-0x000000000679E000-memory.dmp

    Filesize

    120KB

  • memory/2636-22-0x0000000006A50000-0x0000000006AA0000-memory.dmp

    Filesize

    320KB

  • memory/2636-24-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2636-4-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB