Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 08:52
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2f1d19f90db1a28d3c016371b2827e80.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2f1d19f90db1a28d3c016371b2827e80.exe
-
Size
399KB
-
MD5
2f1d19f90db1a28d3c016371b2827e80
-
SHA1
978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13
-
SHA256
9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce
-
SHA512
3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee
-
SSDEEP
6144:Kpy+bnr+Z1p0yN90QEHOoHZHQUEn7epJEGb8r2gxhWoqnrRa2uADXwJIExqrlRvi:nMrDy90RhK7g9b0FHOnNXgy/pt1M
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-7-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2028-8-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2028-9-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2028-11-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
Processes:
r7989047.exes0963947.exepid process 3980 r7989047.exe 4632 s0963947.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NEAS.2f1d19f90db1a28d3c016371b2827e80.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.2f1d19f90db1a28d3c016371b2827e80.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r7989047.exes0963947.exedescription pid process target process PID 3980 set thread context of 2028 3980 r7989047.exe AppLaunch.exe PID 4632 set thread context of 5000 4632 s0963947.exe AppLaunch.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3360 2028 WerFault.exe AppLaunch.exe 2672 3980 WerFault.exe r7989047.exe 3572 4632 WerFault.exe s0963947.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 1520 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
NEAS.2f1d19f90db1a28d3c016371b2827e80.exer7989047.exes0963947.exedescription pid process target process PID 1448 wrote to memory of 3980 1448 NEAS.2f1d19f90db1a28d3c016371b2827e80.exe r7989047.exe PID 1448 wrote to memory of 3980 1448 NEAS.2f1d19f90db1a28d3c016371b2827e80.exe r7989047.exe PID 1448 wrote to memory of 3980 1448 NEAS.2f1d19f90db1a28d3c016371b2827e80.exe r7989047.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 3980 wrote to memory of 2028 3980 r7989047.exe AppLaunch.exe PID 1448 wrote to memory of 4632 1448 NEAS.2f1d19f90db1a28d3c016371b2827e80.exe s0963947.exe PID 1448 wrote to memory of 4632 1448 NEAS.2f1d19f90db1a28d3c016371b2827e80.exe s0963947.exe PID 1448 wrote to memory of 4632 1448 NEAS.2f1d19f90db1a28d3c016371b2827e80.exe s0963947.exe PID 4632 wrote to memory of 5000 4632 s0963947.exe AppLaunch.exe PID 4632 wrote to memory of 5000 4632 s0963947.exe AppLaunch.exe PID 4632 wrote to memory of 5000 4632 s0963947.exe AppLaunch.exe PID 4632 wrote to memory of 5000 4632 s0963947.exe AppLaunch.exe PID 4632 wrote to memory of 5000 4632 s0963947.exe AppLaunch.exe PID 4632 wrote to memory of 5000 4632 s0963947.exe AppLaunch.exe PID 4632 wrote to memory of 5000 4632 s0963947.exe AppLaunch.exe PID 4632 wrote to memory of 5000 4632 s0963947.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2f1d19f90db1a28d3c016371b2827e80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2f1d19f90db1a28d3c016371b2827e80.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7989047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7989047.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 5404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 5963⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0963947.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0963947.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 1403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3980 -ip 39801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2028 -ip 20281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4632 -ip 46321⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7989047.exeFilesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7989047.exeFilesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0963947.exeFilesize
390KB
MD59821a31de4b7f341eb93d3589ed53270
SHA11c3c27b975c3d2958f3ab8e66bc66d239f9f1244
SHA256c9878e544002e30a3c3a551b1edf8a50129fe96f793c458f4c1948f45e71b73f
SHA5129b8f2da4d63ed61a12ae8ae8d67724f9f9e6b6c07350d54b0b9d4e62b4b99a356baf0aa6514ff1f393c8e3667b2df07f424a086850e8e94156845bedef0f1869
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0963947.exeFilesize
390KB
MD59821a31de4b7f341eb93d3589ed53270
SHA11c3c27b975c3d2958f3ab8e66bc66d239f9f1244
SHA256c9878e544002e30a3c3a551b1edf8a50129fe96f793c458f4c1948f45e71b73f
SHA5129b8f2da4d63ed61a12ae8ae8d67724f9f9e6b6c07350d54b0b9d4e62b4b99a356baf0aa6514ff1f393c8e3667b2df07f424a086850e8e94156845bedef0f1869
-
memory/1520-67-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-69-0x000001C8235F0000-0x000001C8235F1000-memory.dmpFilesize
4KB
-
memory/1520-94-0x000001C823840000-0x000001C823841000-memory.dmpFilesize
4KB
-
memory/1520-59-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-60-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-92-0x000001C823730000-0x000001C823731000-memory.dmpFilesize
4KB
-
memory/1520-90-0x000001C823720000-0x000001C823721000-memory.dmpFilesize
4KB
-
memory/1520-78-0x000001C823520000-0x000001C823521000-memory.dmpFilesize
4KB
-
memory/1520-75-0x000001C8235E0000-0x000001C8235E1000-memory.dmpFilesize
4KB
-
memory/1520-72-0x000001C8235F0000-0x000001C8235F1000-memory.dmpFilesize
4KB
-
memory/1520-70-0x000001C8235E0000-0x000001C8235E1000-memory.dmpFilesize
4KB
-
memory/1520-68-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-66-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-65-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-64-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-26-0x000001C81B2B0000-0x000001C81B2C0000-memory.dmpFilesize
64KB
-
memory/1520-42-0x000001C81B3B0000-0x000001C81B3C0000-memory.dmpFilesize
64KB
-
memory/1520-58-0x000001C8239A0000-0x000001C8239A1000-memory.dmpFilesize
4KB
-
memory/1520-63-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-93-0x000001C823730000-0x000001C823731000-memory.dmpFilesize
4KB
-
memory/1520-62-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/1520-61-0x000001C8239C0000-0x000001C8239C1000-memory.dmpFilesize
4KB
-
memory/2028-7-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2028-9-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2028-11-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2028-8-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/5000-22-0x0000000005AC0000-0x0000000005AFC000-memory.dmpFilesize
240KB
-
memory/5000-21-0x0000000005A50000-0x0000000005A62000-memory.dmpFilesize
72KB
-
memory/5000-24-0x00000000743F0000-0x0000000074BA0000-memory.dmpFilesize
7.7MB
-
memory/5000-23-0x0000000005B10000-0x0000000005B5C000-memory.dmpFilesize
304KB
-
memory/5000-20-0x0000000005AB0000-0x0000000005AC0000-memory.dmpFilesize
64KB
-
memory/5000-19-0x0000000005BD0000-0x0000000005CDA000-memory.dmpFilesize
1.0MB
-
memory/5000-18-0x00000000060E0000-0x00000000066F8000-memory.dmpFilesize
6.1MB
-
memory/5000-17-0x0000000005A00000-0x0000000005A06000-memory.dmpFilesize
24KB
-
memory/5000-16-0x00000000743F0000-0x0000000074BA0000-memory.dmpFilesize
7.7MB
-
memory/5000-15-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/5000-25-0x0000000005AB0000-0x0000000005AC0000-memory.dmpFilesize
64KB