Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 02:13
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exe
-
Size
934KB
-
MD5
37e556cc6b44a626b018f8688bda06a0
-
SHA1
eadbabad68cd9ef1f60bf1878637910027ce2435
-
SHA256
8445a1735f8a4bcbb8dc692a63e96b516afc7f4632ac63689f7cdde2aa8de329
-
SHA512
e7da4ef2d75023b3e978c619e0bcfda34f9bb2bde34f4046c842e43b09fff6e6ca1b097f77b06d0edc864dd56d21d892ff99af04b4282f0724134999c8b83912
-
SSDEEP
24576:6yZychi6MZCxusOMPdeNn7oNQVaraOIk3:BZycYZzCkn52I
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-21-0x0000000000400000-0x0000000000433000-memory.dmp family_mystic behavioral1/memory/2372-22-0x0000000000400000-0x0000000000433000-memory.dmp family_mystic behavioral1/memory/2372-23-0x0000000000400000-0x0000000000433000-memory.dmp family_mystic behavioral1/memory/2372-25-0x0000000000400000-0x0000000000433000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2oA495HX.exe family_redline C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2oA495HX.exe family_redline behavioral1/memory/1948-29-0x0000000000920000-0x000000000095E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ZL1db4Lc.exeaQ3So0Ib.exe1Xn79dd1.exe2oA495HX.exepid process 2120 ZL1db4Lc.exe 3088 aQ3So0Ib.exe 1980 1Xn79dd1.exe 1948 2oA495HX.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
aQ3So0Ib.exeNEAS.37e556cc6b44a626b018f8688bda06a0_JC.exeZL1db4Lc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" aQ3So0Ib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ZL1db4Lc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1Xn79dd1.exedescription pid process target process PID 1980 set thread context of 2372 1980 1Xn79dd1.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3788 2372 WerFault.exe AppLaunch.exe 1076 1980 WerFault.exe 1Xn79dd1.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exeZL1db4Lc.exeaQ3So0Ib.exe1Xn79dd1.exedescription pid process target process PID 3616 wrote to memory of 2120 3616 NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exe ZL1db4Lc.exe PID 3616 wrote to memory of 2120 3616 NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exe ZL1db4Lc.exe PID 3616 wrote to memory of 2120 3616 NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exe ZL1db4Lc.exe PID 2120 wrote to memory of 3088 2120 ZL1db4Lc.exe aQ3So0Ib.exe PID 2120 wrote to memory of 3088 2120 ZL1db4Lc.exe aQ3So0Ib.exe PID 2120 wrote to memory of 3088 2120 ZL1db4Lc.exe aQ3So0Ib.exe PID 3088 wrote to memory of 1980 3088 aQ3So0Ib.exe 1Xn79dd1.exe PID 3088 wrote to memory of 1980 3088 aQ3So0Ib.exe 1Xn79dd1.exe PID 3088 wrote to memory of 1980 3088 aQ3So0Ib.exe 1Xn79dd1.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 1980 wrote to memory of 2372 1980 1Xn79dd1.exe AppLaunch.exe PID 3088 wrote to memory of 1948 3088 aQ3So0Ib.exe 2oA495HX.exe PID 3088 wrote to memory of 1948 3088 aQ3So0Ib.exe 2oA495HX.exe PID 3088 wrote to memory of 1948 3088 aQ3So0Ib.exe 2oA495HX.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.37e556cc6b44a626b018f8688bda06a0_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZL1db4Lc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZL1db4Lc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aQ3So0Ib.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aQ3So0Ib.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Xn79dd1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Xn79dd1.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 5406⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 5925⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2oA495HX.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2oA495HX.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1980 -ip 19801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2372 -ip 23721⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZL1db4Lc.exeFilesize
639KB
MD5cb0fa4adf1ece6fa6a1d23d7c421d23a
SHA19f1075100e17ed0c892e9794b021e2aaa2601d5b
SHA256fbb5b8c8cb77cd99893e6b893f2bfe897666439b6292d4706196d3af928e7de7
SHA512b3f77bfa62fd4224f102ff296b5e7fe2b2f3c81ad34a1d210883fa65a318bcdd0bf9027447e40c328e45ad96a90735b55921147c945e350837c47117d3fdd6dd
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZL1db4Lc.exeFilesize
639KB
MD5cb0fa4adf1ece6fa6a1d23d7c421d23a
SHA19f1075100e17ed0c892e9794b021e2aaa2601d5b
SHA256fbb5b8c8cb77cd99893e6b893f2bfe897666439b6292d4706196d3af928e7de7
SHA512b3f77bfa62fd4224f102ff296b5e7fe2b2f3c81ad34a1d210883fa65a318bcdd0bf9027447e40c328e45ad96a90735b55921147c945e350837c47117d3fdd6dd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aQ3So0Ib.exeFilesize
443KB
MD58ecdc622356f400a02bc8df3e87608c1
SHA1f6c8508703ad917558c932dce0db0a956e5ba5f6
SHA2567f97a4890eed703282f8f93c4d10b7fb6cc20a21fcf84810f0b7299a0a56b93f
SHA5121c27c01110683de1e0999988f8b98384bbe77aa1a4d3baffc90053e1ff14177d06b1abfbf27b3133730a701b903bfc730adc88d796cde04f95b08dd4763512f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aQ3So0Ib.exeFilesize
443KB
MD58ecdc622356f400a02bc8df3e87608c1
SHA1f6c8508703ad917558c932dce0db0a956e5ba5f6
SHA2567f97a4890eed703282f8f93c4d10b7fb6cc20a21fcf84810f0b7299a0a56b93f
SHA5121c27c01110683de1e0999988f8b98384bbe77aa1a4d3baffc90053e1ff14177d06b1abfbf27b3133730a701b903bfc730adc88d796cde04f95b08dd4763512f0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Xn79dd1.exeFilesize
422KB
MD55078f44dfb03614e6d3da53e467528e8
SHA1a848b953595eacfc436bb782166897aff3557414
SHA2562fea49e805daa9c87e0ab1060d6d457dba045864827ff041226a11e34a60d337
SHA512f93431c215712b20cb20a9380174ac62289f04d0f4ade3cf6cb06d93bde72304ec1e605032736d3418635acda3f42def66d98d7165f84591db837feecc7456a4
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Xn79dd1.exeFilesize
422KB
MD55078f44dfb03614e6d3da53e467528e8
SHA1a848b953595eacfc436bb782166897aff3557414
SHA2562fea49e805daa9c87e0ab1060d6d457dba045864827ff041226a11e34a60d337
SHA512f93431c215712b20cb20a9380174ac62289f04d0f4ade3cf6cb06d93bde72304ec1e605032736d3418635acda3f42def66d98d7165f84591db837feecc7456a4
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2oA495HX.exeFilesize
221KB
MD5c24604bca103e8d343e8660612bf37c3
SHA11e37a61422600f8096609bdfa0eb0bf1011f558e
SHA25652cfd36a47584086df218cfa23dd34bd3ec7a278f579b711c86a46684bbb72f8
SHA512b70dea049e972b9a6d496ad794bae070b4d388ed93dc2a1eabd99ce47cb2873a7002a3256ef9b2af007f2a0814eee6fbbe1b5f70678338a2eac85338d1100203
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2oA495HX.exeFilesize
221KB
MD5c24604bca103e8d343e8660612bf37c3
SHA11e37a61422600f8096609bdfa0eb0bf1011f558e
SHA25652cfd36a47584086df218cfa23dd34bd3ec7a278f579b711c86a46684bbb72f8
SHA512b70dea049e972b9a6d496ad794bae070b4d388ed93dc2a1eabd99ce47cb2873a7002a3256ef9b2af007f2a0814eee6fbbe1b5f70678338a2eac85338d1100203
-
memory/1948-35-0x0000000008790000-0x0000000008DA8000-memory.dmpFilesize
6.1MB
-
memory/1948-34-0x0000000007890000-0x000000000789A000-memory.dmpFilesize
40KB
-
memory/1948-41-0x0000000007910000-0x0000000007920000-memory.dmpFilesize
64KB
-
memory/1948-40-0x00000000740B0000-0x0000000074860000-memory.dmpFilesize
7.7MB
-
memory/1948-30-0x00000000740B0000-0x0000000074860000-memory.dmpFilesize
7.7MB
-
memory/1948-29-0x0000000000920000-0x000000000095E000-memory.dmpFilesize
248KB
-
memory/1948-31-0x0000000007BC0000-0x0000000008164000-memory.dmpFilesize
5.6MB
-
memory/1948-32-0x00000000076F0000-0x0000000007782000-memory.dmpFilesize
584KB
-
memory/1948-33-0x0000000007910000-0x0000000007920000-memory.dmpFilesize
64KB
-
memory/1948-39-0x0000000007A10000-0x0000000007A5C000-memory.dmpFilesize
304KB
-
memory/1948-38-0x00000000079D0000-0x0000000007A0C000-memory.dmpFilesize
240KB
-
memory/1948-36-0x0000000007AB0000-0x0000000007BBA000-memory.dmpFilesize
1.0MB
-
memory/1948-37-0x0000000007970000-0x0000000007982000-memory.dmpFilesize
72KB
-
memory/2372-21-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2372-25-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2372-22-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2372-23-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB