Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe
-
Size
1.2MB
-
MD5
35e6d0d83c1a24d784a25f6703554fd3
-
SHA1
f6f0c985a6f9a000fe2556deafa9c3b912d1ba20
-
SHA256
1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5
-
SHA512
237b1ed4159b01ad9f791bbfb3730e9b083d617c23897fb0497b36e050ecfd609d291ba0dbc5213d270d35de0a2c80dee2ef0d668deaf1d2167c16185cbceadc
-
SSDEEP
24576:9yWk+rsN4JbSgZwfzyR9r0Tt+uFSXbiNxVhWJluxKHqVI:YWk+rsN4bS2R9KSbKjhyU1
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1068-35-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1068-36-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1068-37-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1068-39-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231e2-41.dat family_redline behavioral2/files/0x00070000000231e2-42.dat family_redline behavioral2/memory/3420-43-0x00000000000D0000-0x000000000010E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3476 hs7pK8Fi.exe 4104 JQ7gT4nk.exe 3004 jn1Cg4sZ.exe 4412 dr6Td7fh.exe 4444 1DM36tM5.exe 3420 2aL034bP.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" dr6Td7fh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" hs7pK8Fi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" JQ7gT4nk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" jn1Cg4sZ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4444 set thread context of 1068 4444 1DM36tM5.exe 92 -
Program crash 2 IoCs
pid pid_target Process procid_target 828 1068 WerFault.exe 92 3104 4444 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3292 wrote to memory of 3476 3292 NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe 86 PID 3292 wrote to memory of 3476 3292 NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe 86 PID 3292 wrote to memory of 3476 3292 NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe 86 PID 3476 wrote to memory of 4104 3476 hs7pK8Fi.exe 87 PID 3476 wrote to memory of 4104 3476 hs7pK8Fi.exe 87 PID 3476 wrote to memory of 4104 3476 hs7pK8Fi.exe 87 PID 4104 wrote to memory of 3004 4104 JQ7gT4nk.exe 88 PID 4104 wrote to memory of 3004 4104 JQ7gT4nk.exe 88 PID 4104 wrote to memory of 3004 4104 JQ7gT4nk.exe 88 PID 3004 wrote to memory of 4412 3004 jn1Cg4sZ.exe 89 PID 3004 wrote to memory of 4412 3004 jn1Cg4sZ.exe 89 PID 3004 wrote to memory of 4412 3004 jn1Cg4sZ.exe 89 PID 4412 wrote to memory of 4444 4412 dr6Td7fh.exe 90 PID 4412 wrote to memory of 4444 4412 dr6Td7fh.exe 90 PID 4412 wrote to memory of 4444 4412 dr6Td7fh.exe 90 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4444 wrote to memory of 1068 4444 1DM36tM5.exe 92 PID 4412 wrote to memory of 3420 4412 dr6Td7fh.exe 99 PID 4412 wrote to memory of 3420 4412 dr6Td7fh.exe 99 PID 4412 wrote to memory of 3420 4412 dr6Td7fh.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 5568⤵
- Program crash
PID:828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 5927⤵
- Program crash
PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aL034bP.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aL034bP.exe6⤵
- Executes dropped EXE
PID:3420
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1068 -ip 10681⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4444 -ip 44441⤵PID:756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD53e2f06d41b144a52aa1260e35397c477
SHA15e3dbadae95600f804aa64e1241ded7796a360b2
SHA256c2515a5127ee8f97cc34d5010c9d3ed1f321e07f3299975b251556776ed58c9b
SHA512e1f60bd589bf995fbc0ef866ce85873470f4350e5d6c1149058ca9508b7f16c87ba3fb53c19731ed77ea70aad60d60eafe048d862c7e8cd1bc6bb3076bd838ea
-
Filesize
1.0MB
MD53e2f06d41b144a52aa1260e35397c477
SHA15e3dbadae95600f804aa64e1241ded7796a360b2
SHA256c2515a5127ee8f97cc34d5010c9d3ed1f321e07f3299975b251556776ed58c9b
SHA512e1f60bd589bf995fbc0ef866ce85873470f4350e5d6c1149058ca9508b7f16c87ba3fb53c19731ed77ea70aad60d60eafe048d862c7e8cd1bc6bb3076bd838ea
-
Filesize
884KB
MD5af694cbed9b219484d7444110f71c64e
SHA1a5f2813bd3bb0bec6b30fc299b86d6a684921f28
SHA256b45f5479a171613b80d9e6131c720039fe54fa34a05a693c389e39fe860d3ca8
SHA512a99e9b531c8f8573c9ede6066a6aad551a3a249ade9b0ce7cbc788257865e9592d27e395408f122b9aec8a322ec093bc42f3003b4f727b28122f8f304386bc60
-
Filesize
884KB
MD5af694cbed9b219484d7444110f71c64e
SHA1a5f2813bd3bb0bec6b30fc299b86d6a684921f28
SHA256b45f5479a171613b80d9e6131c720039fe54fa34a05a693c389e39fe860d3ca8
SHA512a99e9b531c8f8573c9ede6066a6aad551a3a249ade9b0ce7cbc788257865e9592d27e395408f122b9aec8a322ec093bc42f3003b4f727b28122f8f304386bc60
-
Filesize
590KB
MD56f9ea81f43f481c93f4b96f40c957c0d
SHA1f6c8a18315aed12e8f948d2de3a89dc039f4f9ef
SHA256310eceeebc1d9d03fefd45793f82d65923a7ae9128698b16f5fe924faa6fbb82
SHA51224a52bccd3bb25b839f25cd71d27fce19026035a8941dd6661bcbe842feca851530ba6a7f73e00953280292330dbfe1a95c223a38f17ec0bd99d60e068290106
-
Filesize
590KB
MD56f9ea81f43f481c93f4b96f40c957c0d
SHA1f6c8a18315aed12e8f948d2de3a89dc039f4f9ef
SHA256310eceeebc1d9d03fefd45793f82d65923a7ae9128698b16f5fe924faa6fbb82
SHA51224a52bccd3bb25b839f25cd71d27fce19026035a8941dd6661bcbe842feca851530ba6a7f73e00953280292330dbfe1a95c223a38f17ec0bd99d60e068290106
-
Filesize
417KB
MD53f4d0141d4cb30cdeb4f82125b115c95
SHA15f69acfa0d749466b4158fe82158d0411e7d1be2
SHA256e2b942481952a21f27b0f668ff1e3bcf121d5da3d3e2d635a37b81ccc4f9d640
SHA512836c9b4c8445b75b3fad7a8c13154999adb5e15f2b59fc394390706fcd1e1936f527cc0dec5d88f07517724c45bd1f860f770866af77d3767e9f2f0b0a9ecac9
-
Filesize
417KB
MD53f4d0141d4cb30cdeb4f82125b115c95
SHA15f69acfa0d749466b4158fe82158d0411e7d1be2
SHA256e2b942481952a21f27b0f668ff1e3bcf121d5da3d3e2d635a37b81ccc4f9d640
SHA512836c9b4c8445b75b3fad7a8c13154999adb5e15f2b59fc394390706fcd1e1936f527cc0dec5d88f07517724c45bd1f860f770866af77d3767e9f2f0b0a9ecac9
-
Filesize
378KB
MD58fcfdb170413038261bd7034a5cd391b
SHA16e713020515e506b2f36767e88e456564bfc7b14
SHA25662183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2
SHA51257230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8
-
Filesize
378KB
MD58fcfdb170413038261bd7034a5cd391b
SHA16e713020515e506b2f36767e88e456564bfc7b14
SHA25662183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2
SHA51257230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8
-
Filesize
231KB
MD5abb62334d4eab9828517b32104dcdb50
SHA16bdc78b99f75fdbaaf6955c3cefa14619705913a
SHA2566779f7a06942ca362676ce363bce8d4313036f6ce2fa92137e6685054b1ca21f
SHA51207aefc357ac6cc699e037af519686c7db3be422486c313067bdf7c47c212102f617bd941273c242d38f8a27e8d1fce9e2aa0872e3e9e1b8a76f1b74fb7b4c74f
-
Filesize
231KB
MD5abb62334d4eab9828517b32104dcdb50
SHA16bdc78b99f75fdbaaf6955c3cefa14619705913a
SHA2566779f7a06942ca362676ce363bce8d4313036f6ce2fa92137e6685054b1ca21f
SHA51207aefc357ac6cc699e037af519686c7db3be422486c313067bdf7c47c212102f617bd941273c242d38f8a27e8d1fce9e2aa0872e3e9e1b8a76f1b74fb7b4c74f