Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe
-
Size
1.2MB
-
MD5
d4c23a8329fba7a56eba2411789af75b
-
SHA1
48a51891d5b1d6ad63f89667cc2a287a2932d50b
-
SHA256
19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1
-
SHA512
109ec8832cdeef157055d29b73245265cc762ba6062ac74ccd7a7108c116980f47c4fa03d667abe4c1d884f19870acf072affa344c5e1c563ceefd991747357a
-
SSDEEP
24576:8ysAqymZQP8sKZLI18NbVf6TG4M+EveufkpkDGPdRR1+Pgpctoayo6:rXVmK8DIib9GGjYkDGlf2CcaaX
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1588-35-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1588-36-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1588-37-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1588-39-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x00060000000231ee-41.dat family_redline behavioral2/files/0x00060000000231ee-42.dat family_redline behavioral2/memory/3208-43-0x0000000000080000-0x00000000000BE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1104 fu2Ak8bR.exe 2044 Ya3yB3iA.exe 3924 ZD2wO7IY.exe 1624 jP8oc3au.exe 4232 1zI67Cl5.exe 3208 2Up547ao.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" jP8oc3au.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fu2Ak8bR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ya3yB3iA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ZD2wO7IY.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4232 set thread context of 1588 4232 1zI67Cl5.exe 93 -
Program crash 2 IoCs
pid pid_target Process procid_target 1676 4232 WerFault.exe 91 3232 1588 WerFault.exe 93 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 936 wrote to memory of 1104 936 NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe 86 PID 936 wrote to memory of 1104 936 NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe 86 PID 936 wrote to memory of 1104 936 NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe 86 PID 1104 wrote to memory of 2044 1104 fu2Ak8bR.exe 88 PID 1104 wrote to memory of 2044 1104 fu2Ak8bR.exe 88 PID 1104 wrote to memory of 2044 1104 fu2Ak8bR.exe 88 PID 2044 wrote to memory of 3924 2044 Ya3yB3iA.exe 89 PID 2044 wrote to memory of 3924 2044 Ya3yB3iA.exe 89 PID 2044 wrote to memory of 3924 2044 Ya3yB3iA.exe 89 PID 3924 wrote to memory of 1624 3924 ZD2wO7IY.exe 90 PID 3924 wrote to memory of 1624 3924 ZD2wO7IY.exe 90 PID 3924 wrote to memory of 1624 3924 ZD2wO7IY.exe 90 PID 1624 wrote to memory of 4232 1624 jP8oc3au.exe 91 PID 1624 wrote to memory of 4232 1624 jP8oc3au.exe 91 PID 1624 wrote to memory of 4232 1624 jP8oc3au.exe 91 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 4232 wrote to memory of 1588 4232 1zI67Cl5.exe 93 PID 1624 wrote to memory of 3208 1624 jP8oc3au.exe 99 PID 1624 wrote to memory of 3208 1624 jP8oc3au.exe 99 PID 1624 wrote to memory of 3208 1624 jP8oc3au.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fu2Ak8bR.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fu2Ak8bR.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ya3yB3iA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ya3yB3iA.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD2wO7IY.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD2wO7IY.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jP8oc3au.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jP8oc3au.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 2008⤵
- Program crash
PID:3232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 5967⤵
- Program crash
PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Up547ao.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Up547ao.exe6⤵
- Executes dropped EXE
PID:3208
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1588 -ip 15881⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4232 -ip 42321⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5e43be75a2f38702536ae8be892f6071d
SHA158fe2f1a9f866b0d6bc969a5ba33725af7024533
SHA2562da199a6f930f6e21e1a38141135c378d1671180150168c9b39bcebca5f4f843
SHA51204c3e3a012f578c7764d854301413828db9ccc48a124b70d86d6241d9e99aca1a20a831e02777db030d8094cfa724659bb6ef9cbb21d520fa00878cec719b4d7
-
Filesize
1.0MB
MD5e43be75a2f38702536ae8be892f6071d
SHA158fe2f1a9f866b0d6bc969a5ba33725af7024533
SHA2562da199a6f930f6e21e1a38141135c378d1671180150168c9b39bcebca5f4f843
SHA51204c3e3a012f578c7764d854301413828db9ccc48a124b70d86d6241d9e99aca1a20a831e02777db030d8094cfa724659bb6ef9cbb21d520fa00878cec719b4d7
-
Filesize
884KB
MD5228cb70f255bdc745281fb629abd4e8b
SHA193974da5723d28de8b6bcb0ede4913e2569f0fdf
SHA25699616d7e672460dbdc71551358ea4077c8cf32e61a3463102c720089cd47cfb3
SHA512940d719887486b6e9e34fbf43ca49c641e41c1b774759f3aa9bdb9f55f62498dc00aeff05bc9e26c2ee2b24f9db77477e180b886e82b945d4c9033c2f8c21b1d
-
Filesize
884KB
MD5228cb70f255bdc745281fb629abd4e8b
SHA193974da5723d28de8b6bcb0ede4913e2569f0fdf
SHA25699616d7e672460dbdc71551358ea4077c8cf32e61a3463102c720089cd47cfb3
SHA512940d719887486b6e9e34fbf43ca49c641e41c1b774759f3aa9bdb9f55f62498dc00aeff05bc9e26c2ee2b24f9db77477e180b886e82b945d4c9033c2f8c21b1d
-
Filesize
590KB
MD5d1e013a0dd079d63fff41c5869f6c9b8
SHA1a10c675a23af4065cb1f9fe5438562475af5a33a
SHA256e0857614821609f94115398af9c3c968d93233059200e06cd13657f74413c07f
SHA512c793b24dc5cce007c0d9fd9e63bdc6881451ff5122a39a2514e8526323f20dcbad9ffa05ce43c1f368d2fa9b422c47bcf810179b8c808a9c279e21113e3b90e5
-
Filesize
590KB
MD5d1e013a0dd079d63fff41c5869f6c9b8
SHA1a10c675a23af4065cb1f9fe5438562475af5a33a
SHA256e0857614821609f94115398af9c3c968d93233059200e06cd13657f74413c07f
SHA512c793b24dc5cce007c0d9fd9e63bdc6881451ff5122a39a2514e8526323f20dcbad9ffa05ce43c1f368d2fa9b422c47bcf810179b8c808a9c279e21113e3b90e5
-
Filesize
417KB
MD5dc9fb4bb8393ba6dcb939b1d41ed6657
SHA125644b7cae0af1c5f5f3484628aa2501af0c2ff9
SHA2563d3ec00ea2b8ab79113364ec7074e93e9d8e31bc97a952a663a80c44060313f8
SHA512890d6236e712f999f4faa4718c97f71023b65e86c41b8774de07500159984ab498d82d9b6ab6c3cac1a20148801d83db4adbf5839e42b822fb4679adc536efe7
-
Filesize
417KB
MD5dc9fb4bb8393ba6dcb939b1d41ed6657
SHA125644b7cae0af1c5f5f3484628aa2501af0c2ff9
SHA2563d3ec00ea2b8ab79113364ec7074e93e9d8e31bc97a952a663a80c44060313f8
SHA512890d6236e712f999f4faa4718c97f71023b65e86c41b8774de07500159984ab498d82d9b6ab6c3cac1a20148801d83db4adbf5839e42b822fb4679adc536efe7
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
231KB
MD5bf884611bb98b13c78c15c78b822fdd8
SHA14327c576c688fcf3e17e3f6b0e64238a2d4fafa9
SHA256a51c3b6197065a0e297d8dea366a7b8ef55cfc29787de39974ae5affccaf734e
SHA512f87f552961ccc7e382db85ffadf9a5beb20a1c7e2554f713ccff7fa1f92d95e88fafddebb950121a05d2afdea364c4f842c97a3d25c29db2bc21f8ed61990c1d
-
Filesize
231KB
MD5bf884611bb98b13c78c15c78b822fdd8
SHA14327c576c688fcf3e17e3f6b0e64238a2d4fafa9
SHA256a51c3b6197065a0e297d8dea366a7b8ef55cfc29787de39974ae5affccaf734e
SHA512f87f552961ccc7e382db85ffadf9a5beb20a1c7e2554f713ccff7fa1f92d95e88fafddebb950121a05d2afdea364c4f842c97a3d25c29db2bc21f8ed61990c1d