Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 11:20
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe
-
Size
1.2MB
-
MD5
d0c1af93a3f6d35a464a5bfe57a324f5
-
SHA1
8b37fe4cda0ea152950412829c3aca2cd3262347
-
SHA256
300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e
-
SHA512
eea1d81b803e0a3558c99cdc02b6fbdad9d19d3749c1bfd030c9546ce5a1c9121e38a733b78bc34248a8fdf9727663601117260906bf3002e4d492fba5e56295
-
SSDEEP
24576:ayECoKrMdqf3Ef1dCfivYqpkBVp0jJxBjrgeXBn+Whcb5R8uV:hSs3Ef1a4pVjJL/geRnVub5uu
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4820-35-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4820-36-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4820-37-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4820-39-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NN873EZ.exe family_redline C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NN873EZ.exe family_redline behavioral2/memory/2576-44-0x0000000000C70000-0x0000000000CAE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
sD7uY8og.exeUq8RQ5gd.exekT5VV6EA.exemz7rK4RH.exe1SS20pT5.exe2NN873EZ.exepid process 4144 sD7uY8og.exe 5092 Uq8RQ5gd.exe 2940 kT5VV6EA.exe 1464 mz7rK4RH.exe 4628 1SS20pT5.exe 2576 2NN873EZ.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
sD7uY8og.exeUq8RQ5gd.exekT5VV6EA.exemz7rK4RH.exeNEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sD7uY8og.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Uq8RQ5gd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kT5VV6EA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" mz7rK4RH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1SS20pT5.exedescription pid process target process PID 4628 set thread context of 4820 4628 1SS20pT5.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4248 4820 WerFault.exe AppLaunch.exe 3328 4628 WerFault.exe 1SS20pT5.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exesD7uY8og.exeUq8RQ5gd.exekT5VV6EA.exemz7rK4RH.exe1SS20pT5.exedescription pid process target process PID 1076 wrote to memory of 4144 1076 NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe sD7uY8og.exe PID 1076 wrote to memory of 4144 1076 NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe sD7uY8og.exe PID 1076 wrote to memory of 4144 1076 NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe sD7uY8og.exe PID 4144 wrote to memory of 5092 4144 sD7uY8og.exe Uq8RQ5gd.exe PID 4144 wrote to memory of 5092 4144 sD7uY8og.exe Uq8RQ5gd.exe PID 4144 wrote to memory of 5092 4144 sD7uY8og.exe Uq8RQ5gd.exe PID 5092 wrote to memory of 2940 5092 Uq8RQ5gd.exe kT5VV6EA.exe PID 5092 wrote to memory of 2940 5092 Uq8RQ5gd.exe kT5VV6EA.exe PID 5092 wrote to memory of 2940 5092 Uq8RQ5gd.exe kT5VV6EA.exe PID 2940 wrote to memory of 1464 2940 kT5VV6EA.exe mz7rK4RH.exe PID 2940 wrote to memory of 1464 2940 kT5VV6EA.exe mz7rK4RH.exe PID 2940 wrote to memory of 1464 2940 kT5VV6EA.exe mz7rK4RH.exe PID 1464 wrote to memory of 4628 1464 mz7rK4RH.exe 1SS20pT5.exe PID 1464 wrote to memory of 4628 1464 mz7rK4RH.exe 1SS20pT5.exe PID 1464 wrote to memory of 4628 1464 mz7rK4RH.exe 1SS20pT5.exe PID 4628 wrote to memory of 3152 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 3152 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 3152 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 4628 wrote to memory of 4820 4628 1SS20pT5.exe AppLaunch.exe PID 1464 wrote to memory of 2576 1464 mz7rK4RH.exe 2NN873EZ.exe PID 1464 wrote to memory of 2576 1464 mz7rK4RH.exe 2NN873EZ.exe PID 1464 wrote to memory of 2576 1464 mz7rK4RH.exe 2NN873EZ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.300eea77472a8e52b3f2ddc9616f05d14b8a344c410b3b0568b611fdeb2ab03e_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sD7uY8og.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sD7uY8og.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uq8RQ5gd.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uq8RQ5gd.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kT5VV6EA.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kT5VV6EA.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mz7rK4RH.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mz7rK4RH.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1SS20pT5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1SS20pT5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 5408⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 6167⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NN873EZ.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NN873EZ.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4628 -ip 46281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4820 -ip 48201⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sD7uY8og.exeFilesize
1.0MB
MD525067c88c1b0d9c14e252daafa8c6fa6
SHA16f982e04c68baadc475f246db0b4753be70d6d9b
SHA256c0734f423bb8748302e58f63e189985f8d0e5777c1e0b2ecd60d1d1029e980e5
SHA5126f1e01ec4fdf2844177f4fec16a2fe3fa1e6cd577bd6fd4ff23fca9bc145bc27561e69571c10680b7d1c0eb1ad3fc14e4def259a630df003154fc2a19a18f4ff
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sD7uY8og.exeFilesize
1.0MB
MD525067c88c1b0d9c14e252daafa8c6fa6
SHA16f982e04c68baadc475f246db0b4753be70d6d9b
SHA256c0734f423bb8748302e58f63e189985f8d0e5777c1e0b2ecd60d1d1029e980e5
SHA5126f1e01ec4fdf2844177f4fec16a2fe3fa1e6cd577bd6fd4ff23fca9bc145bc27561e69571c10680b7d1c0eb1ad3fc14e4def259a630df003154fc2a19a18f4ff
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uq8RQ5gd.exeFilesize
883KB
MD5876bc3c4f6cc80de6cb6ae804635e809
SHA12b47e1aac8aed52d60f6fafe851949c2c58571b5
SHA2567a0b3320e0257e14a5a417d502fb500d1b867acd29590c05d9c97b349388463c
SHA51219997b83df7d4245edb1061e4f1c94a6fcd031735043570e14e307e54bebba85fe24e1139911dd3250fbf42682a8ed2e38e2b12ae0d60498025a36d6cb13f454
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Uq8RQ5gd.exeFilesize
883KB
MD5876bc3c4f6cc80de6cb6ae804635e809
SHA12b47e1aac8aed52d60f6fafe851949c2c58571b5
SHA2567a0b3320e0257e14a5a417d502fb500d1b867acd29590c05d9c97b349388463c
SHA51219997b83df7d4245edb1061e4f1c94a6fcd031735043570e14e307e54bebba85fe24e1139911dd3250fbf42682a8ed2e38e2b12ae0d60498025a36d6cb13f454
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kT5VV6EA.exeFilesize
590KB
MD52881657188808e4a306e00b89195c73a
SHA183020c8208643d9d27c7844758baccab8a15482c
SHA25677492f34e914abfed88413e5ec6e559b847dc2a8fcd50d480e4b6c5285835fe3
SHA512fdb69dacc2e8805737c361052f292a91ae706f4b548caec3e66d68376d5c9444edde3f15db86265d98e43238050a6a3fd6492e8259e8e7d9c92f348fba262148
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kT5VV6EA.exeFilesize
590KB
MD52881657188808e4a306e00b89195c73a
SHA183020c8208643d9d27c7844758baccab8a15482c
SHA25677492f34e914abfed88413e5ec6e559b847dc2a8fcd50d480e4b6c5285835fe3
SHA512fdb69dacc2e8805737c361052f292a91ae706f4b548caec3e66d68376d5c9444edde3f15db86265d98e43238050a6a3fd6492e8259e8e7d9c92f348fba262148
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mz7rK4RH.exeFilesize
417KB
MD5f3d9b75cb50765335ab49c7de14506d9
SHA1a589adfc605295ec011fc082838651db9f8c9aed
SHA256850361490edd12aa6dafa7277fd6f72264ec9134a4fe6af4547121f77ab9971e
SHA512e3144514e3b42e8da420627c7c3f40adbc43670b17eaeb9c418187a7d838aca6e9da7dd96ae4f711ac1cc5abaf25307709b02e43e5cd7452e9a652e33863c6f1
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mz7rK4RH.exeFilesize
417KB
MD5f3d9b75cb50765335ab49c7de14506d9
SHA1a589adfc605295ec011fc082838651db9f8c9aed
SHA256850361490edd12aa6dafa7277fd6f72264ec9134a4fe6af4547121f77ab9971e
SHA512e3144514e3b42e8da420627c7c3f40adbc43670b17eaeb9c418187a7d838aca6e9da7dd96ae4f711ac1cc5abaf25307709b02e43e5cd7452e9a652e33863c6f1
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1SS20pT5.exeFilesize
378KB
MD525946afd455a920541192ac878a714ac
SHA14e8edd37d9358bdd9858bb2b6abe4eb9df4b4d9a
SHA25676e905725074287687ce5d1d3a55613206a04671e89fee998c9ad44ffd99af46
SHA5129a81f9e5c959186b2d0a048ec1450a6107fb6679280e557c9aa0215b27c7197e00bc2ec54f6f33302b9be792a75f3685f61f26695b0f37a92f3b8040532082db
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1SS20pT5.exeFilesize
378KB
MD525946afd455a920541192ac878a714ac
SHA14e8edd37d9358bdd9858bb2b6abe4eb9df4b4d9a
SHA25676e905725074287687ce5d1d3a55613206a04671e89fee998c9ad44ffd99af46
SHA5129a81f9e5c959186b2d0a048ec1450a6107fb6679280e557c9aa0215b27c7197e00bc2ec54f6f33302b9be792a75f3685f61f26695b0f37a92f3b8040532082db
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NN873EZ.exeFilesize
231KB
MD5b70619eb3c55cc2131f8d0861eb7a86e
SHA1a034114ffb0a0089dab88bc035d58cf1ecce932d
SHA25661d5b01ae171e6f39c35753eaddddbc076912d1f3fedc885d0778e72b6abbd29
SHA51244db720aca39ad6aa7ef2075986cbc04e23d2cd3ab1b5c00259a8699254b08dfa13c5252b19b9c3cdfcf7ea7958334f3c10078c60c10b7ba00f548d59ca04123
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NN873EZ.exeFilesize
231KB
MD5b70619eb3c55cc2131f8d0861eb7a86e
SHA1a034114ffb0a0089dab88bc035d58cf1ecce932d
SHA25661d5b01ae171e6f39c35753eaddddbc076912d1f3fedc885d0778e72b6abbd29
SHA51244db720aca39ad6aa7ef2075986cbc04e23d2cd3ab1b5c00259a8699254b08dfa13c5252b19b9c3cdfcf7ea7958334f3c10078c60c10b7ba00f548d59ca04123
-
memory/2576-46-0x0000000007A80000-0x0000000007B12000-memory.dmpFilesize
584KB
-
memory/2576-43-0x0000000073E20000-0x00000000745D0000-memory.dmpFilesize
7.7MB
-
memory/2576-47-0x0000000007C50000-0x0000000007C60000-memory.dmpFilesize
64KB
-
memory/2576-55-0x0000000007C50000-0x0000000007C60000-memory.dmpFilesize
64KB
-
memory/2576-48-0x0000000007A60000-0x0000000007A6A000-memory.dmpFilesize
40KB
-
memory/2576-44-0x0000000000C70000-0x0000000000CAE000-memory.dmpFilesize
248KB
-
memory/2576-45-0x0000000007F50000-0x00000000084F4000-memory.dmpFilesize
5.6MB
-
memory/2576-49-0x0000000008B20000-0x0000000009138000-memory.dmpFilesize
6.1MB
-
memory/2576-54-0x0000000073E20000-0x00000000745D0000-memory.dmpFilesize
7.7MB
-
memory/2576-53-0x0000000007EB0000-0x0000000007EFC000-memory.dmpFilesize
304KB
-
memory/2576-52-0x0000000007E70000-0x0000000007EAC000-memory.dmpFilesize
240KB
-
memory/2576-50-0x0000000008500000-0x000000000860A000-memory.dmpFilesize
1.0MB
-
memory/2576-51-0x0000000007E10000-0x0000000007E22000-memory.dmpFilesize
72KB
-
memory/4820-36-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4820-39-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4820-35-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4820-37-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB