Analysis

  • max time kernel
    142s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 13:10

General

  • Target

    a65dc9cbe71f0efde3fd50729cf5576bfb4c870329eed8f90dcd0fc1b9aa97ba.exe

  • Size

    3.4MB

  • MD5

    008d9913e8ce8bb934b93c559a2e32fa

  • SHA1

    10e863115463502aaea5c18f71e02221c6cd02db

  • SHA256

    a65dc9cbe71f0efde3fd50729cf5576bfb4c870329eed8f90dcd0fc1b9aa97ba

  • SHA512

    bb2650f0d776cc479b71987b3a5ef6338eb74b70de04b3628bdf8a1d48199b33d8050b6378b46a75cfba744a8800aa374474197018052184631c5edba0066d55

  • SSDEEP

    98304:h8P8hjuTg6NzRkqDGHiR27pb0WAOfraP1:hkoyTgAj6N1b0WAOfraP1

Malware Config

Extracted

Family

redline

Botnet

1

C2

194.36.178.33:47454

Signatures

  • Detect ZGRat V1 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Loads dropped DLL 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a65dc9cbe71f0efde3fd50729cf5576bfb4c870329eed8f90dcd0fc1b9aa97ba.exe
    "C:\Users\Admin\AppData\Local\Temp\a65dc9cbe71f0efde3fd50729cf5576bfb4c870329eed8f90dcd0fc1b9aa97ba.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
      2⤵
        PID:2132
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3260
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3900 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4284

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

        Filesize

        742KB

        MD5

        544cd51a596619b78e9b54b70088307d

        SHA1

        4769ddd2dbc1dc44b758964ed0bd231b85880b65

        SHA256

        dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

        SHA512

        f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

      • C:\Users\Admin\AppData\Local\Temp\TmpEB07.tmp

        Filesize

        2KB

        MD5

        1420d30f964eac2c85b2ccfe968eebce

        SHA1

        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

        SHA256

        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

        SHA512

        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

      • memory/224-12-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-15-0x0000000005B60000-0x0000000005B70000-memory.dmp

        Filesize

        64KB

      • memory/224-4-0x000000007512E000-0x000000007512F000-memory.dmp

        Filesize

        4KB

      • memory/224-5-0x0000000005C80000-0x0000000005E12000-memory.dmp

        Filesize

        1.6MB

      • memory/224-2-0x0000000005A90000-0x0000000005B2C000-memory.dmp

        Filesize

        624KB

      • memory/224-11-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-24-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-13-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-14-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-3-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-16-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-17-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-18-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-19-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-1-0x0000000000D50000-0x00000000010C0000-memory.dmp

        Filesize

        3.4MB

      • memory/224-21-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/224-0-0x000000007512E000-0x000000007512F000-memory.dmp

        Filesize

        4KB

      • memory/3260-25-0x0000000005C60000-0x0000000006204000-memory.dmp

        Filesize

        5.6MB

      • memory/3260-52-0x0000000006C20000-0x0000000006C5C000-memory.dmp

        Filesize

        240KB

      • memory/3260-26-0x00000000055A0000-0x0000000005632000-memory.dmp

        Filesize

        584KB

      • memory/3260-27-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/3260-28-0x0000000005650000-0x000000000565A000-memory.dmp

        Filesize

        40KB

      • memory/3260-20-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/3260-45-0x0000000006490000-0x0000000006506000-memory.dmp

        Filesize

        472KB

      • memory/3260-46-0x0000000006AF0000-0x0000000006B0E000-memory.dmp

        Filesize

        120KB

      • memory/3260-49-0x0000000007130000-0x0000000007748000-memory.dmp

        Filesize

        6.1MB

      • memory/3260-50-0x0000000006C80000-0x0000000006D8A000-memory.dmp

        Filesize

        1.0MB

      • memory/3260-51-0x0000000006BC0000-0x0000000006BD2000-memory.dmp

        Filesize

        72KB

      • memory/3260-23-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/3260-53-0x0000000006D90000-0x0000000006DDC000-memory.dmp

        Filesize

        304KB

      • memory/3260-54-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/3260-55-0x0000000006EF0000-0x0000000006F56000-memory.dmp

        Filesize

        408KB

      • memory/3260-56-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/3260-57-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB

      • memory/3260-58-0x0000000007E20000-0x0000000007FE2000-memory.dmp

        Filesize

        1.8MB

      • memory/3260-59-0x0000000008520000-0x0000000008A4C000-memory.dmp

        Filesize

        5.2MB

      • memory/3260-62-0x0000000007FF0000-0x0000000008040000-memory.dmp

        Filesize

        320KB

      • memory/3260-64-0x0000000075120000-0x00000000758D0000-memory.dmp

        Filesize

        7.7MB