Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe
Resource
win10v2004-20230915-en
General
-
Target
668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe
-
Size
1.6MB
-
MD5
74f87d0cef91031be3d22ad3b0f7242f
-
SHA1
5638f213af3d2bc50c5fcc914b04aa545da38259
-
SHA256
668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf
-
SHA512
e55608458fc1c71609c76cd53fd8cce06587174b41fe8ccbf3ed772c88940f0fc9abc2571cf6385dd4d112f335f79eda59d319972f172dadf974d1919dcf77ef
-
SSDEEP
49152:59ce1L7Co15rhDyLtU4ONFvz+3tmWEZKj:H77rrpyZa63tmWEA
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/3628-35-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/3628-36-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/3628-37-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/3628-39-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000700000002325a-40.dat family_redline behavioral1/files/0x000700000002325a-42.dat family_redline behavioral1/memory/4028-43-0x00000000002F0000-0x000000000032E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4192 Po3MW5Ho.exe 4920 oX0AZ0hG.exe 4488 ve6Wo0yB.exe 1732 AQ3Yv8ep.exe 804 1Gt36KH9.exe 4028 2zT123Pk.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Po3MW5Ho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" oX0AZ0hG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ve6Wo0yB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" AQ3Yv8ep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 804 set thread context of 3628 804 1Gt36KH9.exe 89 -
Program crash 2 IoCs
pid pid_target Process procid_target 2688 804 WerFault.exe 88 4676 3628 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3424 wrote to memory of 4192 3424 668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe 83 PID 3424 wrote to memory of 4192 3424 668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe 83 PID 3424 wrote to memory of 4192 3424 668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe 83 PID 4192 wrote to memory of 4920 4192 Po3MW5Ho.exe 85 PID 4192 wrote to memory of 4920 4192 Po3MW5Ho.exe 85 PID 4192 wrote to memory of 4920 4192 Po3MW5Ho.exe 85 PID 4920 wrote to memory of 4488 4920 oX0AZ0hG.exe 86 PID 4920 wrote to memory of 4488 4920 oX0AZ0hG.exe 86 PID 4920 wrote to memory of 4488 4920 oX0AZ0hG.exe 86 PID 4488 wrote to memory of 1732 4488 ve6Wo0yB.exe 87 PID 4488 wrote to memory of 1732 4488 ve6Wo0yB.exe 87 PID 4488 wrote to memory of 1732 4488 ve6Wo0yB.exe 87 PID 1732 wrote to memory of 804 1732 AQ3Yv8ep.exe 88 PID 1732 wrote to memory of 804 1732 AQ3Yv8ep.exe 88 PID 1732 wrote to memory of 804 1732 AQ3Yv8ep.exe 88 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 804 wrote to memory of 3628 804 1Gt36KH9.exe 89 PID 1732 wrote to memory of 4028 1732 AQ3Yv8ep.exe 95 PID 1732 wrote to memory of 4028 1732 AQ3Yv8ep.exe 95 PID 1732 wrote to memory of 4028 1732 AQ3Yv8ep.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe"C:\Users\Admin\AppData\Local\Temp\668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Po3MW5Ho.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Po3MW5Ho.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oX0AZ0hG.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oX0AZ0hG.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve6Wo0yB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve6Wo0yB.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\AQ3Yv8ep.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\AQ3Yv8ep.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gt36KH9.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gt36KH9.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 5528⤵
- Program crash
PID:4676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 5767⤵
- Program crash
PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2zT123Pk.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2zT123Pk.exe6⤵
- Executes dropped EXE
PID:4028
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3628 -ip 36281⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 804 -ip 8041⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5004b7c6410bead1b880dc286a33b3314
SHA13e0f2f8ade9abed5951323764bfcabbc6e118565
SHA2560087093be35054c15a366c01e76379117999a492126596d7efb649c22a09249c
SHA51263ca6c35a8ff925f09e515c197cce8fe5d7b33db2f88215756ef9376d20f0a320a3e040a0ddf9f9d5f6b7eb7c1f42f4563366a0553ded67c523f249297a61740
-
Filesize
1.5MB
MD5004b7c6410bead1b880dc286a33b3314
SHA13e0f2f8ade9abed5951323764bfcabbc6e118565
SHA2560087093be35054c15a366c01e76379117999a492126596d7efb649c22a09249c
SHA51263ca6c35a8ff925f09e515c197cce8fe5d7b33db2f88215756ef9376d20f0a320a3e040a0ddf9f9d5f6b7eb7c1f42f4563366a0553ded67c523f249297a61740
-
Filesize
1.3MB
MD5635c9691e139956f994a7dc70fa53201
SHA1a214b2cf6b5816f0f2edd42426b0cc5c4e1c61ca
SHA256b65a24e1c6fca41490982ddbe4cc11642863f6d723d643e1e68432858bd8bf8c
SHA5124c45b2f3605f8796c78af7e25763501890a1c26e0801a8ea67dcc898d02c06adca32fa9927f8f0d9fb717145b43bccbcb6e9d4a64d185fdceb1cc1bb9fa30230
-
Filesize
1.3MB
MD5635c9691e139956f994a7dc70fa53201
SHA1a214b2cf6b5816f0f2edd42426b0cc5c4e1c61ca
SHA256b65a24e1c6fca41490982ddbe4cc11642863f6d723d643e1e68432858bd8bf8c
SHA5124c45b2f3605f8796c78af7e25763501890a1c26e0801a8ea67dcc898d02c06adca32fa9927f8f0d9fb717145b43bccbcb6e9d4a64d185fdceb1cc1bb9fa30230
-
Filesize
823KB
MD5edcd04265e3a41c189e2878d20b0b78e
SHA18c6979e0cc6376f38a307d6c0dc7eefb4122910c
SHA2567fd3f95c046b4394711e11f3519d507d0abb3329caf7901d0178641ec093ffc0
SHA512faa65c91c2e45ee24df873442df7f0fef7e09f012d216d527a32c80cc6db078e8815ddd205987561120f56076e99ed2a527e4e4ed79e0a67a9cf34d5097c3534
-
Filesize
823KB
MD5edcd04265e3a41c189e2878d20b0b78e
SHA18c6979e0cc6376f38a307d6c0dc7eefb4122910c
SHA2567fd3f95c046b4394711e11f3519d507d0abb3329caf7901d0178641ec093ffc0
SHA512faa65c91c2e45ee24df873442df7f0fef7e09f012d216d527a32c80cc6db078e8815ddd205987561120f56076e99ed2a527e4e4ed79e0a67a9cf34d5097c3534
-
Filesize
651KB
MD5fa1547d7715dc74b765ea685d5507c9b
SHA11e5eec8f56323ca147cb5c6179834d717ceb0f3a
SHA256b0c752c77cdeae59e2b44fdea8674de1912be9c54ddacba047feb3870338f78a
SHA5122fdb9b7039ae1c0732aca4348f10d13f837f495b79f398cd435f7d8fe2e2217fc867f68b770b5996c753198e6b4737392a9c659e4acae97f10908a77b590da78
-
Filesize
651KB
MD5fa1547d7715dc74b765ea685d5507c9b
SHA11e5eec8f56323ca147cb5c6179834d717ceb0f3a
SHA256b0c752c77cdeae59e2b44fdea8674de1912be9c54ddacba047feb3870338f78a
SHA5122fdb9b7039ae1c0732aca4348f10d13f837f495b79f398cd435f7d8fe2e2217fc867f68b770b5996c753198e6b4737392a9c659e4acae97f10908a77b590da78
-
Filesize
1.7MB
MD5335993db77fa67b5aff1fb1be1b087be
SHA1ca583aa8cd1763027f12d7cebf9d85c8674fb929
SHA256015092782f7d0b4375c44ac3494a7ce4ca80404eb0de57613725e386c9cbb7ca
SHA512eb6bf1a6a36bfb6f72f15cc2d31a4d3ba1606a82233e43b39df30df1079430566af0f3a05027349e8eef5324c82916d92c516509e21b5271ac5decb4089ee229
-
Filesize
1.7MB
MD5335993db77fa67b5aff1fb1be1b087be
SHA1ca583aa8cd1763027f12d7cebf9d85c8674fb929
SHA256015092782f7d0b4375c44ac3494a7ce4ca80404eb0de57613725e386c9cbb7ca
SHA512eb6bf1a6a36bfb6f72f15cc2d31a4d3ba1606a82233e43b39df30df1079430566af0f3a05027349e8eef5324c82916d92c516509e21b5271ac5decb4089ee229
-
Filesize
230KB
MD5ed9ad4f23bee9e433fc8315b96a25c1e
SHA140379aa88141686f07f014dc13ef5622c3219117
SHA256a50e82369b9faeba96246503ede1e4016c95a72f2c09a81cd9030bc34127e8a0
SHA512f45e366f4b9ce6b834e47fcffe3c9e4b1a10761daad39efa2c5ed9288b6c69e67f857f95d889d1664ec6194699f8840e3e9e972fdfba2385f97f729df6c383f0
-
Filesize
230KB
MD5ed9ad4f23bee9e433fc8315b96a25c1e
SHA140379aa88141686f07f014dc13ef5622c3219117
SHA256a50e82369b9faeba96246503ede1e4016c95a72f2c09a81cd9030bc34127e8a0
SHA512f45e366f4b9ce6b834e47fcffe3c9e4b1a10761daad39efa2c5ed9288b6c69e67f857f95d889d1664ec6194699f8840e3e9e972fdfba2385f97f729df6c383f0