Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5dae66c168cccd23b6b060ddfd3b6170.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5dae66c168cccd23b6b060ddfd3b6170.exe
-
Size
758KB
-
MD5
5dae66c168cccd23b6b060ddfd3b6170
-
SHA1
49c18f6523134da0c21b413940e0721abf8ca258
-
SHA256
586d3d384e58bae74f8eb9bb68c36d3d5aec1f4cb3a041a39b84a4a9b895c396
-
SHA512
ded86ee173202eecf70546740c60daf2c4e5e198f327bf7def281fe08ef194ec4e91650528c272966c95c99b3bc2f3b097dcd042dd43f0be537aa3a4f5a13786
-
SSDEEP
12288:kMrUy90nTqx7TP8KN9D8pzOuivKQxivoEUx780wUzl/al+8RVUagWK1PaR433:Qy8q58Kc6SkJx+UlF8RVQx13
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000022de0-20.dat family_redline behavioral1/files/0x0006000000022de0-21.dat family_redline behavioral1/memory/3224-22-0x00000000000E0000-0x000000000011E000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4820 IN7eO3PS.exe 1568 1Yp60SL5.exe 3224 2lf993oa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.5dae66c168cccd23b6b060ddfd3b6170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" IN7eO3PS.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1568 set thread context of 4180 1568 1Yp60SL5.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 1464 4180 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3592 wrote to memory of 4820 3592 NEAS.5dae66c168cccd23b6b060ddfd3b6170.exe 87 PID 3592 wrote to memory of 4820 3592 NEAS.5dae66c168cccd23b6b060ddfd3b6170.exe 87 PID 3592 wrote to memory of 4820 3592 NEAS.5dae66c168cccd23b6b060ddfd3b6170.exe 87 PID 4820 wrote to memory of 1568 4820 IN7eO3PS.exe 88 PID 4820 wrote to memory of 1568 4820 IN7eO3PS.exe 88 PID 4820 wrote to memory of 1568 4820 IN7eO3PS.exe 88 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 1568 wrote to memory of 4180 1568 1Yp60SL5.exe 90 PID 4820 wrote to memory of 3224 4820 IN7eO3PS.exe 92 PID 4820 wrote to memory of 3224 4820 IN7eO3PS.exe 92 PID 4820 wrote to memory of 3224 4820 IN7eO3PS.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5dae66c168cccd23b6b060ddfd3b6170.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5dae66c168cccd23b6b060ddfd3b6170.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IN7eO3PS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IN7eO3PS.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Yp60SL5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Yp60SL5.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 5445⤵
- Program crash
PID:1464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2lf993oa.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2lf993oa.exe3⤵
- Executes dropped EXE
PID:3224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4180 -ip 41801⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
561KB
MD5b7f8bb5aa9cf132c523d66c2f4f27c83
SHA1eb2432c54c52eccc0842e3ed2172d535155804c3
SHA256795e5b22ec095c3f6be5c60a12607b59c7469eb381d3d333fb5f0acf7682b45a
SHA512f1ba84250d2772f5fc889950a82150d5f75277536dc05a575f6ba7c18d1c0ad934f7c7c76c2b62ec2112712d47096114d0dc1bbf5e779adde3154d7ddc2eca47
-
Filesize
561KB
MD5b7f8bb5aa9cf132c523d66c2f4f27c83
SHA1eb2432c54c52eccc0842e3ed2172d535155804c3
SHA256795e5b22ec095c3f6be5c60a12607b59c7469eb381d3d333fb5f0acf7682b45a
SHA512f1ba84250d2772f5fc889950a82150d5f75277536dc05a575f6ba7c18d1c0ad934f7c7c76c2b62ec2112712d47096114d0dc1bbf5e779adde3154d7ddc2eca47
-
Filesize
1.1MB
MD54ae379f98f52003479e3e5a2b1d9ac2c
SHA10117d68e2e3409951f7bcd6d93949925b014b363
SHA2567a2b4a06124b689c680d5ecd05502fa430b5eb96d2e0f84fc8b930ed0ac842c9
SHA51231afe94aad244b9f48bc7026103d6687831223a7d478a71019145def21335fc1cd2278b0ffa9408afeeb48a4887762b2ecd290fe2eecb4101245aa077cc5d952
-
Filesize
1.1MB
MD54ae379f98f52003479e3e5a2b1d9ac2c
SHA10117d68e2e3409951f7bcd6d93949925b014b363
SHA2567a2b4a06124b689c680d5ecd05502fa430b5eb96d2e0f84fc8b930ed0ac842c9
SHA51231afe94aad244b9f48bc7026103d6687831223a7d478a71019145def21335fc1cd2278b0ffa9408afeeb48a4887762b2ecd290fe2eecb4101245aa077cc5d952
-
Filesize
222KB
MD58922842512fedb5985d9f90ccb39b310
SHA16d8126223599dc5de0ba27d8a339ad247664c375
SHA256f5ace2ff24caffb10737ad24e9152763253750064cf9cb75e1a47c9251a4dbf0
SHA512c3b351a1445808f8729b8fec2d19933caaa1db483e11caf56cd5253c84dad603c88fc4ee31d40984f68389bdb0e6a96b523ba14eee96204fc12df237d5ef7df6
-
Filesize
222KB
MD58922842512fedb5985d9f90ccb39b310
SHA16d8126223599dc5de0ba27d8a339ad247664c375
SHA256f5ace2ff24caffb10737ad24e9152763253750064cf9cb75e1a47c9251a4dbf0
SHA512c3b351a1445808f8729b8fec2d19933caaa1db483e11caf56cd5253c84dad603c88fc4ee31d40984f68389bdb0e6a96b523ba14eee96204fc12df237d5ef7df6