Analysis

  • max time kernel
    148s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2023 02:05

General

  • Target

    NEAS.b1014daa354c943ac07bd77ccbb36ba0.exe

  • Size

    1.3MB

  • MD5

    b1014daa354c943ac07bd77ccbb36ba0

  • SHA1

    6308a52ccad0d1aa5d78d6b543c517029297d0da

  • SHA256

    6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833

  • SHA512

    fa222739128e3ac2ec1d7c5730f0748bd67c5886445157f7517f87088096bd190773805721c52abc21ba998f85ae0f377edb52b1445eaed0a53b25b9c932d6c8

  • SSDEEP

    24576:GyV82uVrfLBvFlIW7F9lymuQg0qx+wkKcCg8QsQdGiHibyue3teeQHW:VVIhzBFlIWpJyGCg8lQl0Xe9FQ

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.b1014daa354c943ac07bd77ccbb36ba0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.b1014daa354c943ac07bd77ccbb36ba0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DU0GV2ro.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DU0GV2ro.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ai6vW5qG.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ai6vW5qG.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hV6MS9sj.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hV6MS9sj.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3756
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vF0rA2UI.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vF0rA2UI.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:452
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tm22sn6.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tm22sn6.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4172
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2368
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2752
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 540
                      8⤵
                      • Program crash
                      PID:4416
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 608
                    7⤵
                    • Program crash
                    PID:1688
                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Wu191OC.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Wu191OC.exe
                  6⤵
                  • Executes dropped EXE
                  PID:4680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4172 -ip 4172
        1⤵
          PID:3804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2752 -ip 2752
          1⤵
            PID:4764

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DU0GV2ro.exe

            Filesize

            1.1MB

            MD5

            46c74c67e68161be405cb33896f3b06c

            SHA1

            dec1a2268c4448fadb7a9e4f7df0214727451b59

            SHA256

            2b9747d7ccf39f8782498aa96553e4c5012947cefbcf761ca6eb6389e331c090

            SHA512

            d771b8f38437bb3798e70ce508a0a5821cd5a2aa36584c8807117543826bc4b366157e69c2a2862d3412e6a8cef01849f67cdc20fea5ca95c73980a16e13148f

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DU0GV2ro.exe

            Filesize

            1.1MB

            MD5

            46c74c67e68161be405cb33896f3b06c

            SHA1

            dec1a2268c4448fadb7a9e4f7df0214727451b59

            SHA256

            2b9747d7ccf39f8782498aa96553e4c5012947cefbcf761ca6eb6389e331c090

            SHA512

            d771b8f38437bb3798e70ce508a0a5821cd5a2aa36584c8807117543826bc4b366157e69c2a2862d3412e6a8cef01849f67cdc20fea5ca95c73980a16e13148f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ai6vW5qG.exe

            Filesize

            951KB

            MD5

            57e4d1525720e839e43fbb55a62859d4

            SHA1

            408834c4613b7897a8935026b044048c7aa0f524

            SHA256

            1ab83d9e2769c703b1d6d0be131ecd39acb0a35607166cc623ff46b941987eb1

            SHA512

            31cbac57f17718163278c8c9fb59ed9dc85e19815a32379605088527737660c00ef5436dca7b774193bf61072388e55657ab2173bb4190c2e3ac2041edd645a3

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ai6vW5qG.exe

            Filesize

            951KB

            MD5

            57e4d1525720e839e43fbb55a62859d4

            SHA1

            408834c4613b7897a8935026b044048c7aa0f524

            SHA256

            1ab83d9e2769c703b1d6d0be131ecd39acb0a35607166cc623ff46b941987eb1

            SHA512

            31cbac57f17718163278c8c9fb59ed9dc85e19815a32379605088527737660c00ef5436dca7b774193bf61072388e55657ab2173bb4190c2e3ac2041edd645a3

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hV6MS9sj.exe

            Filesize

            648KB

            MD5

            910ee6352080e426ba3b40702996373a

            SHA1

            e9c0b4a272f618740d76b7712bb15b22358fb64b

            SHA256

            1342d3e9fb35595663b199db5254d30a7cec6476f767117784367e61a4c19708

            SHA512

            2edd9d78ecdf3a7ee27ab4218ae3ea55fe64a460f5bf1e6ce87514845c55605508b5af91db42c2c4d9ad3f6a25044e0784c7303064736c0fb7deaa3df79b9cf2

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hV6MS9sj.exe

            Filesize

            648KB

            MD5

            910ee6352080e426ba3b40702996373a

            SHA1

            e9c0b4a272f618740d76b7712bb15b22358fb64b

            SHA256

            1342d3e9fb35595663b199db5254d30a7cec6476f767117784367e61a4c19708

            SHA512

            2edd9d78ecdf3a7ee27ab4218ae3ea55fe64a460f5bf1e6ce87514845c55605508b5af91db42c2c4d9ad3f6a25044e0784c7303064736c0fb7deaa3df79b9cf2

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vF0rA2UI.exe

            Filesize

            452KB

            MD5

            bfb875022368f94bd37d189b6726d21e

            SHA1

            d8a6f8f608c12016016c2ad41d51794f448501be

            SHA256

            24578a40fe94df08bad3bbf32d8e3087ac9aae19ea01577cd7261975fda36798

            SHA512

            4cf2da5fa84e8b11f7a74395e9e9b86b39f5aefc78ab46a842d3230424d48d74a5e475fc04e5a0d032497dc7894ef0a97ec7f9f3ddfbacb533ded04d46eca547

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vF0rA2UI.exe

            Filesize

            452KB

            MD5

            bfb875022368f94bd37d189b6726d21e

            SHA1

            d8a6f8f608c12016016c2ad41d51794f448501be

            SHA256

            24578a40fe94df08bad3bbf32d8e3087ac9aae19ea01577cd7261975fda36798

            SHA512

            4cf2da5fa84e8b11f7a74395e9e9b86b39f5aefc78ab46a842d3230424d48d74a5e475fc04e5a0d032497dc7894ef0a97ec7f9f3ddfbacb533ded04d46eca547

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tm22sn6.exe

            Filesize

            449KB

            MD5

            464384f130df5eff2bb2ea3331659866

            SHA1

            5aa26db0536f2e6e500dd35270ec63cf2b5583c9

            SHA256

            74fa5d855c8c2ba4aac904d81fbfdb0d6b8fffcca9f8cae1ab72f7675db44b08

            SHA512

            6dd90705568cc6fd34a7d63b4df05554bcdef0d4577ca4a34c648c924ab807a55b42053733d34d2a34e146060b1c8fc27e76d2515eceeeee1d3a1f534dc4db6b

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tm22sn6.exe

            Filesize

            449KB

            MD5

            464384f130df5eff2bb2ea3331659866

            SHA1

            5aa26db0536f2e6e500dd35270ec63cf2b5583c9

            SHA256

            74fa5d855c8c2ba4aac904d81fbfdb0d6b8fffcca9f8cae1ab72f7675db44b08

            SHA512

            6dd90705568cc6fd34a7d63b4df05554bcdef0d4577ca4a34c648c924ab807a55b42053733d34d2a34e146060b1c8fc27e76d2515eceeeee1d3a1f534dc4db6b

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Wu191OC.exe

            Filesize

            222KB

            MD5

            5cfec1c7fce7f18a95d3e72661991c32

            SHA1

            7c77d2b4751f3f131d20fece42db72b29657c8ab

            SHA256

            e562dd8c2eed155b73e52946d1be66a8aef01bb41a332983073aa730112b6ff6

            SHA512

            75949f34766b59bc9289d2a77b20aba7b49ae90ef8a8dfdd47628a5916a51c10b1bfa9ebb0a77ea448d328b09a83933660371f97df4273523cb9175171ae98a5

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Wu191OC.exe

            Filesize

            222KB

            MD5

            5cfec1c7fce7f18a95d3e72661991c32

            SHA1

            7c77d2b4751f3f131d20fece42db72b29657c8ab

            SHA256

            e562dd8c2eed155b73e52946d1be66a8aef01bb41a332983073aa730112b6ff6

            SHA512

            75949f34766b59bc9289d2a77b20aba7b49ae90ef8a8dfdd47628a5916a51c10b1bfa9ebb0a77ea448d328b09a83933660371f97df4273523cb9175171ae98a5

          • memory/2752-36-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2752-37-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2752-39-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2752-35-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/4680-46-0x0000000007B00000-0x0000000007B92000-memory.dmp

            Filesize

            584KB

          • memory/4680-43-0x0000000000C50000-0x0000000000C8E000-memory.dmp

            Filesize

            248KB

          • memory/4680-45-0x0000000008010000-0x00000000085B4000-memory.dmp

            Filesize

            5.6MB

          • memory/4680-44-0x00000000744F0000-0x0000000074CA0000-memory.dmp

            Filesize

            7.7MB

          • memory/4680-47-0x00000000056B0000-0x00000000056C0000-memory.dmp

            Filesize

            64KB

          • memory/4680-48-0x00000000056A0000-0x00000000056AA000-memory.dmp

            Filesize

            40KB

          • memory/4680-49-0x0000000008BE0000-0x00000000091F8000-memory.dmp

            Filesize

            6.1MB

          • memory/4680-50-0x0000000007EF0000-0x0000000007FFA000-memory.dmp

            Filesize

            1.0MB

          • memory/4680-51-0x0000000007E00000-0x0000000007E12000-memory.dmp

            Filesize

            72KB

          • memory/4680-52-0x0000000007E60000-0x0000000007E9C000-memory.dmp

            Filesize

            240KB

          • memory/4680-53-0x0000000007EA0000-0x0000000007EEC000-memory.dmp

            Filesize

            304KB

          • memory/4680-54-0x00000000744F0000-0x0000000074CA0000-memory.dmp

            Filesize

            7.7MB

          • memory/4680-55-0x00000000056B0000-0x00000000056C0000-memory.dmp

            Filesize

            64KB