Analysis
-
max time kernel
166s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 15:37
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe
-
Size
1.4MB
-
MD5
d7330b5bf5d11776b9e85f164ed4dbac
-
SHA1
015c901c53b25b57dcc87b3717ee551bc8e20d77
-
SHA256
c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14
-
SHA512
b4298c4011a35302d7ead43d579244983ec644f41a012edf2264003e4faed2f17794853c4b17788ce4bac57bbd4dfa59736a09134819361742337cce7b783e4f
-
SSDEEP
24576:vy4U3y8WzlCuqdxiatvvNgx9S7cceR3JYeLZk7dLdAgPe5shtj5uTmBeiz:64aazUuUiat3FwZ9vdkFOg/tluT+ei
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
risepro
5.42.92.51
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/544-42-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/544-44-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/544-43-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/544-46-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1736-28-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 4Dn798DH.exe -
Executes dropped EXE 6 IoCs
pid Process 5028 yM2YT12.exe 4564 Ql6xK32.exe 2912 Bz7jI06.exe 3892 2jT4953.exe 3116 3NM67HP.exe 4192 4Dn798DH.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" yM2YT12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ql6xK32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Bz7jI06.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 4Dn798DH.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 4Dn798DH.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 4Dn798DH.exe File opened for modification C:\Windows\System32\GroupPolicy 4Dn798DH.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3892 set thread context of 1736 3892 2jT4953.exe 106 PID 3116 set thread context of 544 3116 3NM67HP.exe 109 -
Program crash 1 IoCs
pid pid_target Process procid_target 3780 544 WerFault.exe 109 -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5020 wrote to memory of 5028 5020 NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe 88 PID 5020 wrote to memory of 5028 5020 NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe 88 PID 5020 wrote to memory of 5028 5020 NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe 88 PID 5028 wrote to memory of 4564 5028 yM2YT12.exe 89 PID 5028 wrote to memory of 4564 5028 yM2YT12.exe 89 PID 5028 wrote to memory of 4564 5028 yM2YT12.exe 89 PID 4564 wrote to memory of 2912 4564 Ql6xK32.exe 91 PID 4564 wrote to memory of 2912 4564 Ql6xK32.exe 91 PID 4564 wrote to memory of 2912 4564 Ql6xK32.exe 91 PID 2912 wrote to memory of 3892 2912 Bz7jI06.exe 92 PID 2912 wrote to memory of 3892 2912 Bz7jI06.exe 92 PID 2912 wrote to memory of 3892 2912 Bz7jI06.exe 92 PID 3892 wrote to memory of 3928 3892 2jT4953.exe 104 PID 3892 wrote to memory of 3928 3892 2jT4953.exe 104 PID 3892 wrote to memory of 3928 3892 2jT4953.exe 104 PID 3892 wrote to memory of 1628 3892 2jT4953.exe 105 PID 3892 wrote to memory of 1628 3892 2jT4953.exe 105 PID 3892 wrote to memory of 1628 3892 2jT4953.exe 105 PID 3892 wrote to memory of 1736 3892 2jT4953.exe 106 PID 3892 wrote to memory of 1736 3892 2jT4953.exe 106 PID 3892 wrote to memory of 1736 3892 2jT4953.exe 106 PID 3892 wrote to memory of 1736 3892 2jT4953.exe 106 PID 3892 wrote to memory of 1736 3892 2jT4953.exe 106 PID 3892 wrote to memory of 1736 3892 2jT4953.exe 106 PID 3892 wrote to memory of 1736 3892 2jT4953.exe 106 PID 3892 wrote to memory of 1736 3892 2jT4953.exe 106 PID 2912 wrote to memory of 3116 2912 Bz7jI06.exe 107 PID 2912 wrote to memory of 3116 2912 Bz7jI06.exe 107 PID 2912 wrote to memory of 3116 2912 Bz7jI06.exe 107 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 3116 wrote to memory of 544 3116 3NM67HP.exe 109 PID 4564 wrote to memory of 4192 4564 Ql6xK32.exe 110 PID 4564 wrote to memory of 4192 4564 Ql6xK32.exe 110 PID 4564 wrote to memory of 4192 4564 Ql6xK32.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2YT12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2YT12.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ql6xK32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ql6xK32.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bz7jI06.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bz7jI06.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jT4953.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jT4953.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3NM67HP.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3NM67HP.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 5407⤵
- Program crash
PID:3780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Dn798DH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Dn798DH.exe4⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- Drops file in System32 directory
PID:4192
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 544 -ip 5441⤵PID:4188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD509f8b3a4c2a3cb91150e2b5e74212b62
SHA1d0fe0a9a50c82b8436d6e588c78a886583ca5031
SHA25619a86cb2947215e3f2ee9be13f72ed40290ecf08400a5603ac0cbdd17be1217c
SHA5121908883c7cfd20f2819d6079c13209c33bdbde32c3705ddd1cd5bcfcd0160f8a45734ef64c3662a002ac7e12d32cc02ff25bf94518b52530bc29d0708eec7d74
-
Filesize
1.2MB
MD509f8b3a4c2a3cb91150e2b5e74212b62
SHA1d0fe0a9a50c82b8436d6e588c78a886583ca5031
SHA25619a86cb2947215e3f2ee9be13f72ed40290ecf08400a5603ac0cbdd17be1217c
SHA5121908883c7cfd20f2819d6079c13209c33bdbde32c3705ddd1cd5bcfcd0160f8a45734ef64c3662a002ac7e12d32cc02ff25bf94518b52530bc29d0708eec7d74
-
Filesize
1.0MB
MD5ecf343a0532408e403bd17e3ac517e09
SHA1e63969192489900f00e9e2b393b6ea2c8b4b60b7
SHA2565bad96daa191ea08b6f3c8731213ee6ea29405017bda92602a32d1e281dbb78d
SHA512965df7ac340596448e01a6836483e7c7f3e4283f1f57f2b12d11531caf9ad228a08111f231fd55287bfaaf5d508a374e1656511b791b852f7ffa462bbc95d5cf
-
Filesize
1.0MB
MD5ecf343a0532408e403bd17e3ac517e09
SHA1e63969192489900f00e9e2b393b6ea2c8b4b60b7
SHA2565bad96daa191ea08b6f3c8731213ee6ea29405017bda92602a32d1e281dbb78d
SHA512965df7ac340596448e01a6836483e7c7f3e4283f1f57f2b12d11531caf9ad228a08111f231fd55287bfaaf5d508a374e1656511b791b852f7ffa462bbc95d5cf
-
Filesize
1.3MB
MD5c9fe4afcb79b2b4cdd699f270201644b
SHA11728f30cbcfc246a4007e224f867af0334e91e8a
SHA25617b3906eeaadd91d1ff80325ed05796046f2ea6524ebab6c9998675cfbe34bc1
SHA51256532d1f286c55f3008ae07c8d9a14182ad93f7915e3953e0b8653037badb5fc2a44c9635b8c6c6866024df40bf68bdf9437c4ea6002dc0b21b67a5a4d7215fd
-
Filesize
1.3MB
MD5c9fe4afcb79b2b4cdd699f270201644b
SHA11728f30cbcfc246a4007e224f867af0334e91e8a
SHA25617b3906eeaadd91d1ff80325ed05796046f2ea6524ebab6c9998675cfbe34bc1
SHA51256532d1f286c55f3008ae07c8d9a14182ad93f7915e3953e0b8653037badb5fc2a44c9635b8c6c6866024df40bf68bdf9437c4ea6002dc0b21b67a5a4d7215fd
-
Filesize
423KB
MD50d65e7f1455323fad50d4bdcdfdab90c
SHA1e653481e5115e290cebdb9cdf970ba5962a038a6
SHA2568bf0a852ec6ec638519ae08a38acf835fd7038f7e1d9752ca83d493955992f2b
SHA51247a4a7bb46fefd8d09e4a37426995099f1e670b3f33e5b5450e120682f7b76582ea25b0c446ed55cf6e3217c435b41fe4e4db39f2c70886c7d6c4eff0b6987ec
-
Filesize
423KB
MD50d65e7f1455323fad50d4bdcdfdab90c
SHA1e653481e5115e290cebdb9cdf970ba5962a038a6
SHA2568bf0a852ec6ec638519ae08a38acf835fd7038f7e1d9752ca83d493955992f2b
SHA51247a4a7bb46fefd8d09e4a37426995099f1e670b3f33e5b5450e120682f7b76582ea25b0c446ed55cf6e3217c435b41fe4e4db39f2c70886c7d6c4eff0b6987ec
-
Filesize
414KB
MD5a7da70102c9cbc310e550ab81b8c5932
SHA1119c3c97d02d954f8173ab0a6bf31727a85399e2
SHA2565ba39a95a06375a01212ca8b9e173d5f1b848ae5a41e7538f29f15d35830728d
SHA5122700099be8df141b8030ed266010328ab847396dbc1cc8dd23d07d8ff0bfca9d30ef37eae891c16543227a24b32fb15b495964b3e0a96ff69b49abc1d529a392
-
Filesize
414KB
MD5a7da70102c9cbc310e550ab81b8c5932
SHA1119c3c97d02d954f8173ab0a6bf31727a85399e2
SHA2565ba39a95a06375a01212ca8b9e173d5f1b848ae5a41e7538f29f15d35830728d
SHA5122700099be8df141b8030ed266010328ab847396dbc1cc8dd23d07d8ff0bfca9d30ef37eae891c16543227a24b32fb15b495964b3e0a96ff69b49abc1d529a392
-
Filesize
378KB
MD5b30fe6549097c39f723ad1bd091332f7
SHA1fe7feaa4c49f2aa085b9594097e6e6f006d3c410
SHA25676cc09d15e02eb46b86b6416ed7576981f814e2db9ad46db0b50475a9419075d
SHA51214c85f255aca2bf0a14458fa05bb13653bc48cd5ab171de3e33e9afdae5d8594d95220bfcefc2e9bc68c6e1a2eee075a7e4ad1bf42bbadcf7f11c7067daf189e
-
Filesize
378KB
MD5b30fe6549097c39f723ad1bd091332f7
SHA1fe7feaa4c49f2aa085b9594097e6e6f006d3c410
SHA25676cc09d15e02eb46b86b6416ed7576981f814e2db9ad46db0b50475a9419075d
SHA51214c85f255aca2bf0a14458fa05bb13653bc48cd5ab171de3e33e9afdae5d8594d95220bfcefc2e9bc68c6e1a2eee075a7e4ad1bf42bbadcf7f11c7067daf189e