Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 13:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe
-
Size
1.2MB
-
MD5
2216ecad807d5a5060e52cee08e93633
-
SHA1
6b4514ade3dded88bb805c37275d461781ee8459
-
SHA256
ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a
-
SHA512
c70fb9d6e92788215214aa1088c5908d532f369f17b9c8e03c6a5a5b9291b25522bcf34698937ec26595cf4dbc27ce1096cc20a4b62fc7fb09bc36b37cc1359c
-
SSDEEP
24576:Hygx1DqX7JQ8k2IhsncGleWShMc3Z1VMRYoSzUFHE:Ss1DqbHXDeWm1VMRYoS
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1200-35-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1200-36-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1200-37-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1200-39-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Yb253ww.exe family_redline C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Yb253ww.exe family_redline behavioral2/memory/2620-43-0x00000000000F0000-0x000000000012E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
pS1fG3Fa.exejM2SO0wf.exesO2Hp1QO.exeIm2Lh5TU.exe1Jg65Km8.exe2Yb253ww.exepid process 1556 pS1fG3Fa.exe 2360 jM2SO0wf.exe 3988 sO2Hp1QO.exe 3808 Im2Lh5TU.exe 4188 1Jg65Km8.exe 2620 2Yb253ww.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exepS1fG3Fa.exejM2SO0wf.exesO2Hp1QO.exeIm2Lh5TU.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pS1fG3Fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" jM2SO0wf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" sO2Hp1QO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Im2Lh5TU.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1Jg65Km8.exedescription pid process target process PID 4188 set thread context of 1200 4188 1Jg65Km8.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3168 1200 WerFault.exe AppLaunch.exe 4696 4188 WerFault.exe 1Jg65Km8.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exepS1fG3Fa.exejM2SO0wf.exesO2Hp1QO.exeIm2Lh5TU.exe1Jg65Km8.exedescription pid process target process PID 1504 wrote to memory of 1556 1504 NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe pS1fG3Fa.exe PID 1504 wrote to memory of 1556 1504 NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe pS1fG3Fa.exe PID 1504 wrote to memory of 1556 1504 NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe pS1fG3Fa.exe PID 1556 wrote to memory of 2360 1556 pS1fG3Fa.exe jM2SO0wf.exe PID 1556 wrote to memory of 2360 1556 pS1fG3Fa.exe jM2SO0wf.exe PID 1556 wrote to memory of 2360 1556 pS1fG3Fa.exe jM2SO0wf.exe PID 2360 wrote to memory of 3988 2360 jM2SO0wf.exe sO2Hp1QO.exe PID 2360 wrote to memory of 3988 2360 jM2SO0wf.exe sO2Hp1QO.exe PID 2360 wrote to memory of 3988 2360 jM2SO0wf.exe sO2Hp1QO.exe PID 3988 wrote to memory of 3808 3988 sO2Hp1QO.exe Im2Lh5TU.exe PID 3988 wrote to memory of 3808 3988 sO2Hp1QO.exe Im2Lh5TU.exe PID 3988 wrote to memory of 3808 3988 sO2Hp1QO.exe Im2Lh5TU.exe PID 3808 wrote to memory of 4188 3808 Im2Lh5TU.exe 1Jg65Km8.exe PID 3808 wrote to memory of 4188 3808 Im2Lh5TU.exe 1Jg65Km8.exe PID 3808 wrote to memory of 4188 3808 Im2Lh5TU.exe 1Jg65Km8.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 4188 wrote to memory of 1200 4188 1Jg65Km8.exe AppLaunch.exe PID 3808 wrote to memory of 2620 3808 Im2Lh5TU.exe 2Yb253ww.exe PID 3808 wrote to memory of 2620 3808 Im2Lh5TU.exe 2Yb253ww.exe PID 3808 wrote to memory of 2620 3808 Im2Lh5TU.exe 2Yb253ww.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 1968⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 5927⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Yb253ww.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Yb253ww.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4188 -ip 41881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1200 -ip 12001⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exeFilesize
1.0MB
MD5a7543a6d367ce3b64480f2e08e9d5199
SHA18b8a89d6f1992df15b02e75d7acd40cc06e1d5ae
SHA2565823925d139ce7818401631c48b26b293fabc432e81bfff43e500d668c2c7839
SHA5120daf0117a5f41874b69d0b70bddc7c127170dcfec4f80b48001a00db4b752f44a7799d64890e862ed2ae004edbbbbc3eee07eb190384b7d1361be054974e1680
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exeFilesize
1.0MB
MD5a7543a6d367ce3b64480f2e08e9d5199
SHA18b8a89d6f1992df15b02e75d7acd40cc06e1d5ae
SHA2565823925d139ce7818401631c48b26b293fabc432e81bfff43e500d668c2c7839
SHA5120daf0117a5f41874b69d0b70bddc7c127170dcfec4f80b48001a00db4b752f44a7799d64890e862ed2ae004edbbbbc3eee07eb190384b7d1361be054974e1680
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exeFilesize
884KB
MD5647ee86523eaecfe1a5c7ccbefbb285b
SHA1eebdfa46090344086969e33d80bccbc5c13db95a
SHA25633fd4eac40ad1872bfe8043978598ec1dbdd9c5dac1e9e78dfa94c0f040bf933
SHA5128a842841ecc7ee9a469c4e59ed6e31ff79d72d5d91dca21a08b0068d64f1d5c9cdabf4e95f893b1807a6711b8af81854fd94756c370399fbe4dee701253400c9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exeFilesize
884KB
MD5647ee86523eaecfe1a5c7ccbefbb285b
SHA1eebdfa46090344086969e33d80bccbc5c13db95a
SHA25633fd4eac40ad1872bfe8043978598ec1dbdd9c5dac1e9e78dfa94c0f040bf933
SHA5128a842841ecc7ee9a469c4e59ed6e31ff79d72d5d91dca21a08b0068d64f1d5c9cdabf4e95f893b1807a6711b8af81854fd94756c370399fbe4dee701253400c9
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exeFilesize
590KB
MD5e7afa3f04af45c3dee2e3ceba4a7b592
SHA1da365c140dedb4cfe5fd99f1757850fa96ea9678
SHA25619fecbe7c4fe6b587e9187b3f59959dda087600171b81a7b00d2615556d69471
SHA512307ea14058f2e86f0038f8b8ffa34230dbf5bb78c9572c8dfb861f283ea75534619ece5b6a329cc1d0c0f658899c08ee84ee2c8be3f8cdfd2df586058e604d48
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exeFilesize
590KB
MD5e7afa3f04af45c3dee2e3ceba4a7b592
SHA1da365c140dedb4cfe5fd99f1757850fa96ea9678
SHA25619fecbe7c4fe6b587e9187b3f59959dda087600171b81a7b00d2615556d69471
SHA512307ea14058f2e86f0038f8b8ffa34230dbf5bb78c9572c8dfb861f283ea75534619ece5b6a329cc1d0c0f658899c08ee84ee2c8be3f8cdfd2df586058e604d48
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exeFilesize
417KB
MD5413d949438db4adf4746f42b3e558d82
SHA1a4c8069ef945792a9820520d2a710cceb9e52e8a
SHA256826a3434edfe24b0e761d08da3d037fb2e5bf124d4c0b05aaa4b12ee17426788
SHA512f06ddb9186c293fa1f88a4813a7b7eea2b909174d449edad86259548304a229e69d65957efb20bb14dc2712d1942a638a66fd4fd84cbc9366333545fe6b6f735
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exeFilesize
417KB
MD5413d949438db4adf4746f42b3e558d82
SHA1a4c8069ef945792a9820520d2a710cceb9e52e8a
SHA256826a3434edfe24b0e761d08da3d037fb2e5bf124d4c0b05aaa4b12ee17426788
SHA512f06ddb9186c293fa1f88a4813a7b7eea2b909174d449edad86259548304a229e69d65957efb20bb14dc2712d1942a638a66fd4fd84cbc9366333545fe6b6f735
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exeFilesize
378KB
MD59c94eb162f0a9ae92b95895fb3265eac
SHA1efa8e659462f885e6d2008d7811a7676e60bf8f4
SHA256444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881
SHA512fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exeFilesize
378KB
MD59c94eb162f0a9ae92b95895fb3265eac
SHA1efa8e659462f885e6d2008d7811a7676e60bf8f4
SHA256444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881
SHA512fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Yb253ww.exeFilesize
231KB
MD51b267ab7ccf0013ecb3521fccb51e45c
SHA1480fea81746ad365980b4043229ac5810d26476b
SHA2562ec12ac88fa1a5ca2fa8c8fb4640451a2b8d8ba63315a4587468805aa23bacb9
SHA512076153fbcfb99c7cf64f6ea1fdb0a2ddda049acd87898fc43ae40646be5c100bbb52ea15ab6fc46f4783beda0b5db9e748af3d2cf0338908da15cb071b437a86
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Yb253ww.exeFilesize
231KB
MD51b267ab7ccf0013ecb3521fccb51e45c
SHA1480fea81746ad365980b4043229ac5810d26476b
SHA2562ec12ac88fa1a5ca2fa8c8fb4640451a2b8d8ba63315a4587468805aa23bacb9
SHA512076153fbcfb99c7cf64f6ea1fdb0a2ddda049acd87898fc43ae40646be5c100bbb52ea15ab6fc46f4783beda0b5db9e748af3d2cf0338908da15cb071b437a86
-
memory/1200-36-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1200-37-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1200-39-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1200-35-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2620-46-0x0000000006EE0000-0x0000000006F72000-memory.dmpFilesize
584KB
-
memory/2620-43-0x00000000000F0000-0x000000000012E000-memory.dmpFilesize
248KB
-
memory/2620-45-0x00000000073F0000-0x0000000007994000-memory.dmpFilesize
5.6MB
-
memory/2620-44-0x0000000074A00000-0x00000000751B0000-memory.dmpFilesize
7.7MB
-
memory/2620-47-0x00000000070E0000-0x00000000070F0000-memory.dmpFilesize
64KB
-
memory/2620-48-0x0000000006ED0000-0x0000000006EDA000-memory.dmpFilesize
40KB
-
memory/2620-49-0x0000000007FC0000-0x00000000085D8000-memory.dmpFilesize
6.1MB
-
memory/2620-50-0x00000000079A0000-0x0000000007AAA000-memory.dmpFilesize
1.0MB
-
memory/2620-51-0x0000000007290000-0x00000000072A2000-memory.dmpFilesize
72KB
-
memory/2620-52-0x00000000072F0000-0x000000000732C000-memory.dmpFilesize
240KB
-
memory/2620-53-0x0000000007330000-0x000000000737C000-memory.dmpFilesize
304KB
-
memory/2620-54-0x0000000074A00000-0x00000000751B0000-memory.dmpFilesize
7.7MB
-
memory/2620-55-0x00000000070E0000-0x00000000070F0000-memory.dmpFilesize
64KB