Analysis
-
max time kernel
9s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 01:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e71b3e82dff6cfcb94c9c35deb7221b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.e71b3e82dff6cfcb94c9c35deb7221b0.exe
-
Size
1.3MB
-
MD5
e71b3e82dff6cfcb94c9c35deb7221b0
-
SHA1
351e87cfe5b2af1494feccb6df4e33620c9e84fa
-
SHA256
d26b1be37b5b12691f4989956ef7b72ff6bf2ec8a670b138cf837211bd215316
-
SHA512
a2ca4ed2845de981da45090dc338dea020eadfa4dfe4fce16e16b93673e9c17d3e19d010e8a0a898ce3f1dd2a11bbd232358242c0b8996532824282341d15d5c
-
SSDEEP
24576:xyRaC4fcFQheOd6n6dEmX2C78BLd1o6/WKlOSD+cpljGI/5yXnt+5:kRB4EFQhesOh1oKlIkjGIx6k
Malware Config
Extracted
redline
kedru
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1796-28-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1796-32-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1796-30-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1796-29-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000022e21-34.dat family_redline behavioral1/files/0x0006000000022e21-35.dat family_redline behavioral1/memory/4800-37-0x00000000006D0000-0x000000000070C000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 4768 dN2OL8lH.exe 3976 EB9Uv3XT.exe 3128 QT2AI9YK.exe 5068 1Ls45kV2.exe 4800 2nv797Zu.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.e71b3e82dff6cfcb94c9c35deb7221b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dN2OL8lH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" EB9Uv3XT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" QT2AI9YK.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 1796 5068 1Ls45kV2.exe 72 -
Program crash 1 IoCs
pid pid_target Process procid_target 1068 1796 WerFault.exe 72 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4768 4244 NEAS.e71b3e82dff6cfcb94c9c35deb7221b0.exe 55 PID 4244 wrote to memory of 4768 4244 NEAS.e71b3e82dff6cfcb94c9c35deb7221b0.exe 55 PID 4244 wrote to memory of 4768 4244 NEAS.e71b3e82dff6cfcb94c9c35deb7221b0.exe 55 PID 4768 wrote to memory of 3976 4768 dN2OL8lH.exe 58 PID 4768 wrote to memory of 3976 4768 dN2OL8lH.exe 58 PID 4768 wrote to memory of 3976 4768 dN2OL8lH.exe 58 PID 3976 wrote to memory of 3128 3976 EB9Uv3XT.exe 60 PID 3976 wrote to memory of 3128 3976 EB9Uv3XT.exe 60 PID 3976 wrote to memory of 3128 3976 EB9Uv3XT.exe 60 PID 3128 wrote to memory of 5068 3128 QT2AI9YK.exe 62 PID 3128 wrote to memory of 5068 3128 QT2AI9YK.exe 62 PID 3128 wrote to memory of 5068 3128 QT2AI9YK.exe 62 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 5068 wrote to memory of 1796 5068 1Ls45kV2.exe 72 PID 3128 wrote to memory of 4800 3128 QT2AI9YK.exe 69 PID 3128 wrote to memory of 4800 3128 QT2AI9YK.exe 69 PID 3128 wrote to memory of 4800 3128 QT2AI9YK.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e71b3e82dff6cfcb94c9c35deb7221b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e71b3e82dff6cfcb94c9c35deb7221b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dN2OL8lH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dN2OL8lH.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EB9Uv3XT.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EB9Uv3XT.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\QT2AI9YK.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\QT2AI9YK.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ls45kV2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ls45kV2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 5407⤵
- Program crash
PID:1068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2nv797Zu.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2nv797Zu.exe5⤵
- Executes dropped EXE
PID:4800
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1796 -ip 17961⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5e3d76a0d05cefb91f3bbdef560958790
SHA1171883ee2f7e4aa131cf1c6ad142fab0e09bca7a
SHA25655ba3000984faae8513a4157545413f2180b6782390b2e30a571106b4eb6fbec
SHA512ea15433536d489908c0a8d7b583b190d70495bfe2526523870bd70e289efe454f51d7192c863e8a969501af40641f1da1ff5ac1d0901b6f77ace30babf2f49d3
-
Filesize
1.1MB
MD5e3d76a0d05cefb91f3bbdef560958790
SHA1171883ee2f7e4aa131cf1c6ad142fab0e09bca7a
SHA25655ba3000984faae8513a4157545413f2180b6782390b2e30a571106b4eb6fbec
SHA512ea15433536d489908c0a8d7b583b190d70495bfe2526523870bd70e289efe454f51d7192c863e8a969501af40641f1da1ff5ac1d0901b6f77ace30babf2f49d3
-
Filesize
753KB
MD59db7388987f066d5cce5dc42c68e8a5d
SHA15411e0e63b1fe8e10fde230f3ab30c92d2c049dc
SHA25673b7ec932dfcb1ebd6096cef90d5d0673b23b43f8052b09baf07f74d966ec12d
SHA512a2b3391dc480461cd0c3e50392d9fb6f63f921ddee92f74a04dced36101ef054de98044c46fa991c0e25a9c90e61c5350193987b6b7b5e6db511ca6f410e6278
-
Filesize
753KB
MD59db7388987f066d5cce5dc42c68e8a5d
SHA15411e0e63b1fe8e10fde230f3ab30c92d2c049dc
SHA25673b7ec932dfcb1ebd6096cef90d5d0673b23b43f8052b09baf07f74d966ec12d
SHA512a2b3391dc480461cd0c3e50392d9fb6f63f921ddee92f74a04dced36101ef054de98044c46fa991c0e25a9c90e61c5350193987b6b7b5e6db511ca6f410e6278
-
Filesize
558KB
MD555b33aa2b281cb6319b903a663136693
SHA19e5b66faea9131ae8a2679041e82d5b6dacfa8ab
SHA2564d3644491fd1a1ac2759163863e8acd7a0c3f18c88d3647c41cfdd684b22968a
SHA512ec1ed41b242825cb918c03dc4152fd3a5b0ae676cd90957190003ff3e185301e7e17d06f41e8e124fed5c71454effc8a1a4e4c00251040f7a9e5468b3a4738d1
-
Filesize
558KB
MD555b33aa2b281cb6319b903a663136693
SHA19e5b66faea9131ae8a2679041e82d5b6dacfa8ab
SHA2564d3644491fd1a1ac2759163863e8acd7a0c3f18c88d3647c41cfdd684b22968a
SHA512ec1ed41b242825cb918c03dc4152fd3a5b0ae676cd90957190003ff3e185301e7e17d06f41e8e124fed5c71454effc8a1a4e4c00251040f7a9e5468b3a4738d1
-
Filesize
1.0MB
MD5a5a72ed79ae5e9780a11e88e6c6853c2
SHA19c59ba2bdb9066bedc108596ed94633c824edec8
SHA2564d29c049f541cf4cfc30160228c05c981a115b3890004fb839ff261b99b62051
SHA51284b85e7ce7701c18bffba0a76a289ab8f43dffaa77604d2c4e3682feb3dd8e937a70b00aba3213c5303d3ffa7bfc7e97008d39505087ace7c3cce9baac9b9d88
-
Filesize
1.0MB
MD5a5a72ed79ae5e9780a11e88e6c6853c2
SHA19c59ba2bdb9066bedc108596ed94633c824edec8
SHA2564d29c049f541cf4cfc30160228c05c981a115b3890004fb839ff261b99b62051
SHA51284b85e7ce7701c18bffba0a76a289ab8f43dffaa77604d2c4e3682feb3dd8e937a70b00aba3213c5303d3ffa7bfc7e97008d39505087ace7c3cce9baac9b9d88
-
Filesize
219KB
MD5c59b3883230bc6c756eceff071591dad
SHA11c2855d67696e112d3746b3bb1fb180386f89467
SHA2564d175dcfaeda1e81dad76d4d11b24fe977f45ebb49b3cad30a269bb471f423d2
SHA5126de800865ab911d4f0f0a8848c1b0c151a74b16eaf35ff11de5f98a6a11c6716a9fe1fb375dce16b64f663f128f60083777e1d16a2ceaa44e3dd31b5e31ecfbf
-
Filesize
219KB
MD5c59b3883230bc6c756eceff071591dad
SHA11c2855d67696e112d3746b3bb1fb180386f89467
SHA2564d175dcfaeda1e81dad76d4d11b24fe977f45ebb49b3cad30a269bb471f423d2
SHA5126de800865ab911d4f0f0a8848c1b0c151a74b16eaf35ff11de5f98a6a11c6716a9fe1fb375dce16b64f663f128f60083777e1d16a2ceaa44e3dd31b5e31ecfbf