Analysis
-
max time kernel
139s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2023 02:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9301cb162262c21467e409e34c083b10.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.9301cb162262c21467e409e34c083b10.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.9301cb162262c21467e409e34c083b10.exe
-
Size
890KB
-
MD5
9301cb162262c21467e409e34c083b10
-
SHA1
abcf1b431853b7115ae6091b591d5de7a93677ec
-
SHA256
2e1d54b8f901ca82b03038d7e5dd540ac9291ee4e641f4de787e628b930134c1
-
SHA512
8e891e9a6ad6b6375e46beb88ee82fbb681d5ef1299d52c2e0e88f22e53dfe25a4381560a51af169a327b80e56a7c7c7c6fb87efb31bb871ec6781d1f08318c3
-
SSDEEP
12288:bMrTy90OZT83eCKnvhpcxMrAevRsXeWIoJOLS6R8QxixFIFW76pSin5G/4ej:MyNZNCupcxMrAanWO+6KQA6n5Ah
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4868-19-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4868-20-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4868-21-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4868-23-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2040-14-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4468 z5140034.exe 1764 q0075553.exe 4352 r5010541.exe 3812 s1304113.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.9301cb162262c21467e409e34c083b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5140034.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1764 set thread context of 2040 1764 q0075553.exe 93 PID 4352 set thread context of 4868 4352 r5010541.exe 98 PID 3812 set thread context of 4876 3812 s1304113.exe 107 -
Program crash 4 IoCs
pid pid_target Process procid_target 2264 1764 WerFault.exe 91 4864 4352 WerFault.exe 96 4860 4868 WerFault.exe 98 1368 3812 WerFault.exe 103 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 AppLaunch.exe 2040 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2040 AppLaunch.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4468 2512 NEAS.9301cb162262c21467e409e34c083b10.exe 90 PID 2512 wrote to memory of 4468 2512 NEAS.9301cb162262c21467e409e34c083b10.exe 90 PID 2512 wrote to memory of 4468 2512 NEAS.9301cb162262c21467e409e34c083b10.exe 90 PID 4468 wrote to memory of 1764 4468 z5140034.exe 91 PID 4468 wrote to memory of 1764 4468 z5140034.exe 91 PID 4468 wrote to memory of 1764 4468 z5140034.exe 91 PID 1764 wrote to memory of 2040 1764 q0075553.exe 93 PID 1764 wrote to memory of 2040 1764 q0075553.exe 93 PID 1764 wrote to memory of 2040 1764 q0075553.exe 93 PID 1764 wrote to memory of 2040 1764 q0075553.exe 93 PID 1764 wrote to memory of 2040 1764 q0075553.exe 93 PID 1764 wrote to memory of 2040 1764 q0075553.exe 93 PID 1764 wrote to memory of 2040 1764 q0075553.exe 93 PID 1764 wrote to memory of 2040 1764 q0075553.exe 93 PID 4468 wrote to memory of 4352 4468 z5140034.exe 96 PID 4468 wrote to memory of 4352 4468 z5140034.exe 96 PID 4468 wrote to memory of 4352 4468 z5140034.exe 96 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 4352 wrote to memory of 4868 4352 r5010541.exe 98 PID 2512 wrote to memory of 3812 2512 NEAS.9301cb162262c21467e409e34c083b10.exe 103 PID 2512 wrote to memory of 3812 2512 NEAS.9301cb162262c21467e409e34c083b10.exe 103 PID 2512 wrote to memory of 3812 2512 NEAS.9301cb162262c21467e409e34c083b10.exe 103 PID 3812 wrote to memory of 4876 3812 s1304113.exe 107 PID 3812 wrote to memory of 4876 3812 s1304113.exe 107 PID 3812 wrote to memory of 4876 3812 s1304113.exe 107 PID 3812 wrote to memory of 4876 3812 s1304113.exe 107 PID 3812 wrote to memory of 4876 3812 s1304113.exe 107 PID 3812 wrote to memory of 4876 3812 s1304113.exe 107 PID 3812 wrote to memory of 4876 3812 s1304113.exe 107 PID 3812 wrote to memory of 4876 3812 s1304113.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9301cb162262c21467e409e34c083b10.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9301cb162262c21467e409e34c083b10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5140034.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5140034.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q0075553.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q0075553.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 1404⤵
- Program crash
PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5010541.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5010541.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 5405⤵
- Program crash
PID:4860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 1484⤵
- Program crash
PID:4864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1304113.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1304113.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 1403⤵
- Program crash
PID:1368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1764 -ip 17641⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4352 -ip 43521⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4868 -ip 48681⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3812 -ip 38121⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5170c2d85d4d23434fac6f0490134d271
SHA1c112036ed860c7e78d237ba2e940bcfe0cdde30c
SHA2560377e5b8ec6edd6f4818195aa45ac8010e7dcb5079bec718216e148e21765ac9
SHA512888d144c8c73752d27870cea26a22701d11d63ca4146b7253cd40aa2777873979b8e4ad886cffd5d65d185aba8a16bf52afa774a4ac5bc04324651a3df4bccd3
-
Filesize
1.0MB
MD5170c2d85d4d23434fac6f0490134d271
SHA1c112036ed860c7e78d237ba2e940bcfe0cdde30c
SHA2560377e5b8ec6edd6f4818195aa45ac8010e7dcb5079bec718216e148e21765ac9
SHA512888d144c8c73752d27870cea26a22701d11d63ca4146b7253cd40aa2777873979b8e4ad886cffd5d65d185aba8a16bf52afa774a4ac5bc04324651a3df4bccd3
-
Filesize
499KB
MD53abbfa448b60de10f3fbda079fc1ede1
SHA19be3b2dc46377c0ce21809fffd2bd5a3b88a0b46
SHA256ab46c18d29907aae620962f7302a257d3a5789cd8f58adc2191e1569ec2b64fc
SHA512604374b8fd993806979ac89d65e2710d542c4eed557623db1bb7eeac5b58c139115186d3f49d0b19cf64b0e03d7e2763d4fd9856197fdc2e76ae8a233ac37751
-
Filesize
499KB
MD53abbfa448b60de10f3fbda079fc1ede1
SHA19be3b2dc46377c0ce21809fffd2bd5a3b88a0b46
SHA256ab46c18d29907aae620962f7302a257d3a5789cd8f58adc2191e1569ec2b64fc
SHA512604374b8fd993806979ac89d65e2710d542c4eed557623db1bb7eeac5b58c139115186d3f49d0b19cf64b0e03d7e2763d4fd9856197fdc2e76ae8a233ac37751
-
Filesize
860KB
MD59fe4f348592f5abfac13127b76ee54af
SHA1fb3a82f325d56a3e91613d90a253ea11f52c3033
SHA256b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc
SHA5128d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59
-
Filesize
860KB
MD59fe4f348592f5abfac13127b76ee54af
SHA1fb3a82f325d56a3e91613d90a253ea11f52c3033
SHA256b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc
SHA5128d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59
-
Filesize
1016KB
MD58078177861b4615ee055179a999ab29e
SHA1158d24fd37af5447b57d23ff2fc7cfacd6e2b1a8
SHA2562fe3799f6321b28cc6a9583d919c7f65cdff167fb0f1f0ffce5840fa5dba7f29
SHA5127f7775267659793400c3b2ad824bb5c95cee0a505c902d3b897e281072eaee672b085e7d0273f6a39b93eda69320954faf03a1a0bb58c6f44c5eb7173e7213c2
-
Filesize
1016KB
MD58078177861b4615ee055179a999ab29e
SHA1158d24fd37af5447b57d23ff2fc7cfacd6e2b1a8
SHA2562fe3799f6321b28cc6a9583d919c7f65cdff167fb0f1f0ffce5840fa5dba7f29
SHA5127f7775267659793400c3b2ad824bb5c95cee0a505c902d3b897e281072eaee672b085e7d0273f6a39b93eda69320954faf03a1a0bb58c6f44c5eb7173e7213c2