Overview
overview
10Static
static
30e13a10fd6...cb.exe
windows10-2004-x64
101d089addfe...b5.exe
windows10-2004-x64
1035d50aca92...42.exe
windows10-2004-x64
103ab23a3036...c6.exe
windows10-2004-x64
1058ac39bbc6...9e.exe
windows10-2004-x64
1064792ffeec...35.exe
windows10-2004-x64
10654aa4d5e8...3b.exe
windows10-2004-x64
10677afbc183...fd.exe
windows7-x64
3677afbc183...fd.exe
windows10-2004-x64
1071d1420ff1...80.exe
windows10-2004-x64
107a08e2a624...2b.exe
windows10-2004-x64
108c7a2623ea...7d.exe
windows10-2004-x64
10c64d3873d4...2e.exe
windows10-2004-x64
10cbd8058875...48.exe
windows7-x64
3cbd8058875...48.exe
windows10-2004-x64
10ec20c35511...9b.exe
windows10-2004-x64
10eca60134d9...3f.exe
windows10-2004-x64
10ecc005f21f...de.exe
windows10-2004-x64
f0fb625894...03.exe
windows10-2004-x64
10f66a0103e4...71.exe
windows10-2004-x64
10ffa14d4c0b...02.exe
windows10-2004-x64
10Analysis
-
max time kernel
120s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
0e13a10fd67a47892e598c6953856fd7786d3e7b1f70c519cae5cfe6b7ce37cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
35d50aca923965e5a644e1735c8cd657d562282a8fddd8a654982c84f9258342.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3ab23a30366cb3cfeded88ccba1999ff26ead2bcde69af9aad7e2ed1fa054cc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
58ac39bbc629fc59614b3b5578967a587814d2de70f8a9cba5090cdfbbfb469e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64792ffeeccbab6bb3d100eb7b35cb61c8c90b802e42d83350baf6d1ceefbb35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
654aa4d5e8d49043a4c5b40ef9c1b2fde8bd371386fd43ed6b7c1d719f41533b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
71d1420ff1b7b7e37d536b943d3ba7e0a2fa5972fce4156cbbc73c7416d49d80.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7a08e2a624c497b3986fed503c84dd39612ab1fdda740280e5a1514c1aac802b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c64d3873d4dbf74d0c6e28f27a09adb2a8c897e218d1a4a4f5822391bf80c92e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
cbd8058875fbf90f6f6a3c6825fab01a2bac4ffb1903f2a0405d451060ea1a48.exe
Resource
win7-20231129-en
Behavioral task
behavioral15
Sample
cbd8058875fbf90f6f6a3c6825fab01a2bac4ffb1903f2a0405d451060ea1a48.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ec20c355119abdb18d4433dc95969146db3a558e4e316a175b184ea42d45f89b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ecc005f21f15aefcf4a4280bfeddf37e7a9066e1fede069eb10a19bfaf62dade.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f0fb625894c32db0094ce88fe51ad9ddb2db188124af7a638cf184eccf3d1203.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f66a0103e4528b09122b55cb248c3007154afc26e699fa5ddf5d3f200e810a71.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ffa14d4c0be8bc789970a81ab0d1c4ceb689e261224f173a8dbd9609a9b45102.exe
Resource
win10v2004-20240508-en
General
-
Target
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
-
Size
467KB
-
MD5
3ef1aae1590eb138e6444db02fd3c1c1
-
SHA1
d8906538be380eecb256132a5a87682d8b14e254
-
SHA256
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd
-
SHA512
9146ebe581ffa7bae67a8bf74969e8144c4d059c3409d75a20b40771b8d6511f9ec5c49a2a0664646798d6b21094d3b8b5cb8ae4992d3a03e5c6bfa34c27d694
-
SSDEEP
12288:iZZE67b6ybYwz3EtKooU0EpPSnGkOaPVDOQSFv3uMyL98F:6G6/bYvt10EpPSGkOaPoMRZu
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral9/memory/3068-0-0x0000000000400000-0x000000000044A000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral9/memory/3068-0-0x0000000000400000-0x000000000044A000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3240 set thread context of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 3732 3240 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3068 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3068 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81 PID 3240 wrote to memory of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81 PID 3240 wrote to memory of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81 PID 3240 wrote to memory of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81 PID 3240 wrote to memory of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81 PID 3240 wrote to memory of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81 PID 3240 wrote to memory of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81 PID 3240 wrote to memory of 3068 3240 677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe"C:\Users\Admin\AppData\Local\Temp\677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 3042⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3240 -ip 32401⤵PID:2684