Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 23:40
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe
-
Size
426KB
-
MD5
7d4a69c65851eed92bb3c18a3cbbfa90
-
SHA1
2b96b4ca11b46405aaf634748b97168b67c1fcf8
-
SHA256
780c385a4a0971c375f65da31bde5d3c8b23426ce0f26b6401152786e23650ec
-
SHA512
4906a495b42d6671ddc28b284e5edf9be63a2e111985e48a9d07b7db4e8b8bf3b32f6a056dfbbf34749ba77836c21381a9b37a3a8b535c85a0927a31f16a8df2
-
SSDEEP
12288:rMrdy90QqOmVfjoTadA37OhbpmPZZ5/Yja2e:CytRmVfjoTadAL+piZXgj0
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/4768-7-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4768-8-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4768-9-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4768-11-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1448-15-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 2840 3qo87Ry.exe 1560 6Yt3ls9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2840 set thread context of 4768 2840 3qo87Ry.exe 98 PID 1560 set thread context of 1448 1560 6Yt3ls9.exe 106 -
Program crash 1 IoCs
pid pid_target Process procid_target 1188 4768 WerFault.exe 98 -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3396 wrote to memory of 2840 3396 NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe 86 PID 3396 wrote to memory of 2840 3396 NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe 86 PID 3396 wrote to memory of 2840 3396 NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe 86 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 2840 wrote to memory of 4768 2840 3qo87Ry.exe 98 PID 3396 wrote to memory of 1560 3396 NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe 99 PID 3396 wrote to memory of 1560 3396 NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe 99 PID 3396 wrote to memory of 1560 3396 NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe 99 PID 1560 wrote to memory of 3636 1560 6Yt3ls9.exe 105 PID 1560 wrote to memory of 3636 1560 6Yt3ls9.exe 105 PID 1560 wrote to memory of 3636 1560 6Yt3ls9.exe 105 PID 1560 wrote to memory of 1448 1560 6Yt3ls9.exe 106 PID 1560 wrote to memory of 1448 1560 6Yt3ls9.exe 106 PID 1560 wrote to memory of 1448 1560 6Yt3ls9.exe 106 PID 1560 wrote to memory of 1448 1560 6Yt3ls9.exe 106 PID 1560 wrote to memory of 1448 1560 6Yt3ls9.exe 106 PID 1560 wrote to memory of 1448 1560 6Yt3ls9.exe 106 PID 1560 wrote to memory of 1448 1560 6Yt3ls9.exe 106 PID 1560 wrote to memory of 1448 1560 6Yt3ls9.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7d4a69c65851eed92bb3c18a3cbbfa90.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3qo87Ry.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3qo87Ry.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 2004⤵
- Program crash
PID:1188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Yt3ls9.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Yt3ls9.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4768 -ip 47681⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD561a9c60d54c1c0d43ac3e950ed1bfdaa
SHA13eda41ab2643e08c05a2a18369510c1ed8d04837
SHA256c88419e5aeb2a826ba9a8a3e830f0d595973a95b0d099aae7509b7ba9870a6f9
SHA5121bdbbdc976433b1a8e4c62f076544e3224c3b7f0e43c8c933225545c13280f2ddfadd8a1e8d841ad9c7a0f5006c5d0612a7e9896cb432a23cb0c9891a9713b5b
-
Filesize
369KB
MD561a9c60d54c1c0d43ac3e950ed1bfdaa
SHA13eda41ab2643e08c05a2a18369510c1ed8d04837
SHA256c88419e5aeb2a826ba9a8a3e830f0d595973a95b0d099aae7509b7ba9870a6f9
SHA5121bdbbdc976433b1a8e4c62f076544e3224c3b7f0e43c8c933225545c13280f2ddfadd8a1e8d841ad9c7a0f5006c5d0612a7e9896cb432a23cb0c9891a9713b5b
-
Filesize
408KB
MD5252184b1d2a395505e6b5632be8a4ac2
SHA1f9014d5eda40f2668d092dfdbbfb30915e7b053e
SHA256a1b6b221d6b59ee7fe09ec505a510a606f4efd648fde8929ba7b1eeafaba0a53
SHA5129e4c276a85021acf84853a1c59a4797d76691a10728ab1a218a47868dca107ec693f893d04a843e6469118d8aed92e70b50eaededd32c559e4d26c42693b73d6
-
Filesize
408KB
MD5252184b1d2a395505e6b5632be8a4ac2
SHA1f9014d5eda40f2668d092dfdbbfb30915e7b053e
SHA256a1b6b221d6b59ee7fe09ec505a510a606f4efd648fde8929ba7b1eeafaba0a53
SHA5129e4c276a85021acf84853a1c59a4797d76691a10728ab1a218a47868dca107ec693f893d04a843e6469118d8aed92e70b50eaededd32c559e4d26c42693b73d6