Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 14:11
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6f532b047ef3133943ba7d1c9e979710.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.6f532b047ef3133943ba7d1c9e979710.exe
-
Size
539KB
-
MD5
6f532b047ef3133943ba7d1c9e979710
-
SHA1
048b40f1d21bae58183717398b5072d3d412577a
-
SHA256
3e86bd1463b0fbcb4c39762cee11a8e301816821af2c3708110a65fbe3f16916
-
SHA512
8e360455a5304e08247ad73ab77c7503f986e0c6c175ce32d8de80eb59803747ce2dc0512d86a12634aaa33e5353b47fa1077b4d71b02d4517a753c8fe70a128
-
SSDEEP
12288:yMrWy901HTdXc+y//fUVop3PKPY152Z57fGbgNMV:Aye++y3fCop3PKQ15kZBNu
Malware Config
Extracted
redline
jordan
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/3252-21-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/3252-22-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/3252-23-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/3252-25-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0008000000022d61-12.dat healer behavioral1/files/0x0008000000022d61-13.dat healer behavioral1/memory/116-14-0x0000000000320000-0x000000000032A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q4687438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q4687438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q4687438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q4687438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q4687438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q4687438.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/5060-29-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2952 z9474111.exe 116 q4687438.exe 1700 r9927096.exe 2136 s0008370.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q4687438.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.6f532b047ef3133943ba7d1c9e979710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9474111.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1700 set thread context of 3252 1700 r9927096.exe 97 PID 2136 set thread context of 5060 2136 s0008370.exe 106 -
Program crash 3 IoCs
pid pid_target Process procid_target 1476 3252 WerFault.exe 97 1072 1700 WerFault.exe 95 1204 2136 WerFault.exe 103 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 116 q4687438.exe 116 q4687438.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 116 q4687438.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2952 4388 NEAS.6f532b047ef3133943ba7d1c9e979710.exe 84 PID 4388 wrote to memory of 2952 4388 NEAS.6f532b047ef3133943ba7d1c9e979710.exe 84 PID 4388 wrote to memory of 2952 4388 NEAS.6f532b047ef3133943ba7d1c9e979710.exe 84 PID 2952 wrote to memory of 116 2952 z9474111.exe 85 PID 2952 wrote to memory of 116 2952 z9474111.exe 85 PID 2952 wrote to memory of 1700 2952 z9474111.exe 95 PID 2952 wrote to memory of 1700 2952 z9474111.exe 95 PID 2952 wrote to memory of 1700 2952 z9474111.exe 95 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 1700 wrote to memory of 3252 1700 r9927096.exe 97 PID 4388 wrote to memory of 2136 4388 NEAS.6f532b047ef3133943ba7d1c9e979710.exe 103 PID 4388 wrote to memory of 2136 4388 NEAS.6f532b047ef3133943ba7d1c9e979710.exe 103 PID 4388 wrote to memory of 2136 4388 NEAS.6f532b047ef3133943ba7d1c9e979710.exe 103 PID 2136 wrote to memory of 1724 2136 s0008370.exe 105 PID 2136 wrote to memory of 1724 2136 s0008370.exe 105 PID 2136 wrote to memory of 1724 2136 s0008370.exe 105 PID 2136 wrote to memory of 5060 2136 s0008370.exe 106 PID 2136 wrote to memory of 5060 2136 s0008370.exe 106 PID 2136 wrote to memory of 5060 2136 s0008370.exe 106 PID 2136 wrote to memory of 5060 2136 s0008370.exe 106 PID 2136 wrote to memory of 5060 2136 s0008370.exe 106 PID 2136 wrote to memory of 5060 2136 s0008370.exe 106 PID 2136 wrote to memory of 5060 2136 s0008370.exe 106 PID 2136 wrote to memory of 5060 2136 s0008370.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6f532b047ef3133943ba7d1c9e979710.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6f532b047ef3133943ba7d1c9e979710.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9474111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9474111.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q4687438.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q4687438.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9927096.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9927096.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 5405⤵
- Program crash
PID:1476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 6124⤵
- Program crash
PID:1072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0008370.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0008370.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 1523⤵
- Program crash
PID:1204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1700 -ip 17001⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3252 -ip 32521⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2136 -ip 21361⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5ad16c57165109d65188d097b45db4d63
SHA102569eafdc59bebafa84f117d5c6626f1d3f01d9
SHA256524dc40a05ee0256996f5626923d69b7b610798f8480220695b3277db71b9ec7
SHA5125e6eafd8ac5376db95b84964c07930fc899ed3e78d2e0cda2d3441cc9eba738c59ad61d3d2993b48bd71e47d4f3de1c055ec4a07ecdc23091f2b32023f6cdd88
-
Filesize
367KB
MD5ad16c57165109d65188d097b45db4d63
SHA102569eafdc59bebafa84f117d5c6626f1d3f01d9
SHA256524dc40a05ee0256996f5626923d69b7b610798f8480220695b3277db71b9ec7
SHA5125e6eafd8ac5376db95b84964c07930fc899ed3e78d2e0cda2d3441cc9eba738c59ad61d3d2993b48bd71e47d4f3de1c055ec4a07ecdc23091f2b32023f6cdd88
-
Filesize
293KB
MD503a9b443229985b8430fa84688f9ad88
SHA128f9d326f75917d2063877a05aa405de177f61a4
SHA25630bf5e268df608594f94fecebc946d2f9166bd5a7324f5b23106bd2649a7f3a6
SHA5122e06d823ccfc076447a3ec810a6e3276722d9f782d651838f895e3b99585d45baf809b0a54028f6fbee4fc873784d5a3f509e4869a313c45cbdd8acb7a4cd5b8
-
Filesize
293KB
MD503a9b443229985b8430fa84688f9ad88
SHA128f9d326f75917d2063877a05aa405de177f61a4
SHA25630bf5e268df608594f94fecebc946d2f9166bd5a7324f5b23106bd2649a7f3a6
SHA5122e06d823ccfc076447a3ec810a6e3276722d9f782d651838f895e3b99585d45baf809b0a54028f6fbee4fc873784d5a3f509e4869a313c45cbdd8acb7a4cd5b8
-
Filesize
12KB
MD5f73b3357e1e682c0692201aef4e79da5
SHA1d3bd0583e13d747c16020f8f3f3f254e7cd39a2c
SHA2567f75e4f610b51a8320a0e1942155bed7888482eea9d5967232805e46b9561721
SHA512fed3107670528ffb1dbc5267dbea54a3c74bddad6142753c50937007d7ef383f01d9670f037b25328bc40e113c8a2d7d05bab3588b89414147a777431b6afb96
-
Filesize
12KB
MD5f73b3357e1e682c0692201aef4e79da5
SHA1d3bd0583e13d747c16020f8f3f3f254e7cd39a2c
SHA2567f75e4f610b51a8320a0e1942155bed7888482eea9d5967232805e46b9561721
SHA512fed3107670528ffb1dbc5267dbea54a3c74bddad6142753c50937007d7ef383f01d9670f037b25328bc40e113c8a2d7d05bab3588b89414147a777431b6afb96
-
Filesize
285KB
MD527fe097082f52b3ec7b759044ad4e17b
SHA171e005dabf4370ab68266196682caa7915f326c0
SHA256ae0b1d7daae5df1adab405bd037e41aa58107261efc536d6f1c15236fc0b759f
SHA51299aabd17bb7c63c29d021489be8be09dac082ce584a346403cd472e93111c8c1931a11827b5e7bb3b0ea5566f5504c4df42619418a06152df9c2d7a5629e6f02
-
Filesize
285KB
MD527fe097082f52b3ec7b759044ad4e17b
SHA171e005dabf4370ab68266196682caa7915f326c0
SHA256ae0b1d7daae5df1adab405bd037e41aa58107261efc536d6f1c15236fc0b759f
SHA51299aabd17bb7c63c29d021489be8be09dac082ce584a346403cd472e93111c8c1931a11827b5e7bb3b0ea5566f5504c4df42619418a06152df9c2d7a5629e6f02