Overview
overview
10Static
static
30de9ceb4a3...69.exe
windows7-x64
30de9ceb4a3...69.exe
windows10-2004-x64
100e996fcc71...f5.exe
windows7-x64
30e996fcc71...f5.exe
windows10-2004-x64
102ab1df3f8f...6b.exe
windows7-x64
32ab1df3f8f...6b.exe
windows10-2004-x64
102d7becaac8...2a.exe
windows10-2004-x64
1050b189382d...9a.exe
windows7-x64
350b189382d...9a.exe
windows10-2004-x64
1057959e3af4...c6.exe
windows7-x64
357959e3af4...c6.exe
windows10-2004-x64
105f7c9e83d8...c5.exe
windows7-x64
35f7c9e83d8...c5.exe
windows10-2004-x64
1064b48352a0...25.exe
windows7-x64
364b48352a0...25.exe
windows10-2004-x64
108a870280a0...35.exe
windows7-x64
38a870280a0...35.exe
windows10-2004-x64
108f1e4113ca...56.exe
windows7-x64
38f1e4113ca...56.exe
windows10-2004-x64
1094cb7f4064...ae.exe
windows10-2004-x64
109d876cd8a7...ed.exe
windows7-x64
39d876cd8a7...ed.exe
windows10-2004-x64
10a4fbd5dfa9...dd.exe
windows7-x64
10a4fbd5dfa9...dd.exe
windows10-2004-x64
10b3796a101c...4b.exe
windows10-2004-x64
7f09814000e...42.exe
windows7-x64
3f09814000e...42.exe
windows10-2004-x64
10f18a59d97c...79.exe
windows10-2004-x64
7Analysis
-
max time kernel
92s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
0de9ceb4a3f0c63cb68673edcd3c26b70ac2ec4f12d5cdf1d81db75f95ef3e69.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0de9ceb4a3f0c63cb68673edcd3c26b70ac2ec4f12d5cdf1d81db75f95ef3e69.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0e996fcc71a35f368ba66b5bcbbbd91872770dfbf086c97dd4f55f6a6a7d8df5.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
0e996fcc71a35f368ba66b5bcbbbd91872770dfbf086c97dd4f55f6a6a7d8df5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2d7becaac8437a8c0258bb0f063a1a2af48f03d8a3322e7389e31d21b2350a2a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
50b189382de3005433c015bc4f22fa6a9cebf1525a24a8eeb6fb3cf59ad3489a.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
50b189382de3005433c015bc4f22fa6a9cebf1525a24a8eeb6fb3cf59ad3489a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
57959e3af4c320aee2b25232e4f113ef2f450d94cb99bbef61b762a6a63ff2c6.exe
Resource
win7-20240508-en
Behavioral task
behavioral11
Sample
57959e3af4c320aee2b25232e4f113ef2f450d94cb99bbef61b762a6a63ff2c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
64b48352a0dd795ca6516c50657af217337775242d7cc7c6b88a2881a343a825.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
64b48352a0dd795ca6516c50657af217337775242d7cc7c6b88a2881a343a825.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
8a870280a0dc165cadf46427c4e47c56d3fa42aa2cf823a54358bf48f5102435.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
8a870280a0dc165cadf46427c4e47c56d3fa42aa2cf823a54358bf48f5102435.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
8f1e4113cab4b08359d501a8144bada9b1e16e7c08944bd38dffc1b93f044a56.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
8f1e4113cab4b08359d501a8144bada9b1e16e7c08944bd38dffc1b93f044a56.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
9d876cd8a7ae7579651cacc17adc0cb431edfb9d97ab5211307feacb7d83fced.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
9d876cd8a7ae7579651cacc17adc0cb431edfb9d97ab5211307feacb7d83fced.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
a4fbd5dfa976d2526590065d16e166ae2ba5b58a17bdcc8d1efbaca35ae55cdd.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
a4fbd5dfa976d2526590065d16e166ae2ba5b58a17bdcc8d1efbaca35ae55cdd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
f09814000e7cb43d244be02b82ed9e60e120494de3b1919428114f861d94a542.exe
Resource
win7-20231129-en
Behavioral task
behavioral27
Sample
f09814000e7cb43d244be02b82ed9e60e120494de3b1919428114f861d94a542.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
f18a59d97c873b24dac2d0b58c2c05627cd4379185e2fad2bbdbac27c2174d79.exe
Resource
win10v2004-20240508-en
General
-
Target
2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe
-
Size
1.2MB
-
MD5
f84173f34e2dde73b09e195674093006
-
SHA1
ac48cb5947b04688398d45f330497c2e2139e82b
-
SHA256
2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b
-
SHA512
fee46161a9fbb2762feb9bef37ddfccf96a5de6f11f0113197ad5b13ab280c738a3ed000e655a6aec55a615c5f916d9c2b30d37de197aae2e5536f2ea6e02d58
-
SSDEEP
24576:ofRaixH28+VpdGfVDeJJmJMsGM5aDnLmXs7Ms:ofsnVpdGfVDe2PGyXsgs
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral6/memory/4092-2-0x0000000000400000-0x000000000044A000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral6/memory/4092-2-0x0000000000400000-0x000000000044A000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4092 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4092 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2528 wrote to memory of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86 PID 2528 wrote to memory of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86 PID 2528 wrote to memory of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86 PID 2528 wrote to memory of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86 PID 2528 wrote to memory of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86 PID 2528 wrote to memory of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86 PID 2528 wrote to memory of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86 PID 2528 wrote to memory of 4092 2528 2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe"C:\Users\Admin\AppData\Local\Temp\2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-