Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
Resource
win10v2004-20230915-en
General
-
Target
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
-
Size
1.2MB
-
MD5
36c41f38b00cc021774f16f386a792eb
-
SHA1
91c449b031fa7bbbcd320e3e0ad87b403faed296
-
SHA256
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513
-
SHA512
032b5a66957ce300aa9efcb5f5975e75e3f1ac7c23a504d0df960a45acba0aaac388c519ff406da3c5c45d6afc18307a1a6b0f087f93d36544ed3d827236879a
-
SSDEEP
24576:6ynHGvOpkdL807eJprsEj/1gs9V+OMdpyZVR8lo2QSarsRd:BnHGmpkdLNeDsy1gs9V+OMGZVR8DKoR
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1972-35-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1972-36-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1972-37-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1972-39-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023222-41.dat family_redline behavioral1/files/0x0007000000023222-42.dat family_redline behavioral1/memory/4728-43-0x0000000000AB0000-0x0000000000AEE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4380 EB1TT8bV.exe 1312 YX8Uk6gT.exe 2232 iY4ZC3yg.exe 1364 tJ4rr5YT.exe 224 1hv74RA6.exe 4728 2Mk806aH.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" EB1TT8bV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" YX8Uk6gT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" iY4ZC3yg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" tJ4rr5YT.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 224 set thread context of 1972 224 1hv74RA6.exe 93 -
Program crash 2 IoCs
pid pid_target Process procid_target 2188 1972 WerFault.exe 93 4692 224 WerFault.exe 91 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 788 svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3556 wrote to memory of 4380 3556 49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe 87 PID 3556 wrote to memory of 4380 3556 49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe 87 PID 3556 wrote to memory of 4380 3556 49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe 87 PID 4380 wrote to memory of 1312 4380 EB1TT8bV.exe 88 PID 4380 wrote to memory of 1312 4380 EB1TT8bV.exe 88 PID 4380 wrote to memory of 1312 4380 EB1TT8bV.exe 88 PID 1312 wrote to memory of 2232 1312 YX8Uk6gT.exe 89 PID 1312 wrote to memory of 2232 1312 YX8Uk6gT.exe 89 PID 1312 wrote to memory of 2232 1312 YX8Uk6gT.exe 89 PID 2232 wrote to memory of 1364 2232 iY4ZC3yg.exe 90 PID 2232 wrote to memory of 1364 2232 iY4ZC3yg.exe 90 PID 2232 wrote to memory of 1364 2232 iY4ZC3yg.exe 90 PID 1364 wrote to memory of 224 1364 tJ4rr5YT.exe 91 PID 1364 wrote to memory of 224 1364 tJ4rr5YT.exe 91 PID 1364 wrote to memory of 224 1364 tJ4rr5YT.exe 91 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 224 wrote to memory of 1972 224 1hv74RA6.exe 93 PID 1364 wrote to memory of 4728 1364 tJ4rr5YT.exe 99 PID 1364 wrote to memory of 4728 1364 tJ4rr5YT.exe 99 PID 1364 wrote to memory of 4728 1364 tJ4rr5YT.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe"C:\Users\Admin\AppData\Local\Temp\49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EB1TT8bV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EB1TT8bV.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YX8Uk6gT.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YX8Uk6gT.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iY4ZC3yg.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iY4ZC3yg.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tJ4rr5YT.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tJ4rr5YT.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hv74RA6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hv74RA6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 5408⤵
- Program crash
PID:2188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 5927⤵
- Program crash
PID:4692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mk806aH.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mk806aH.exe6⤵
- Executes dropped EXE
PID:4728
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1972 -ip 19721⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 224 -ip 2241⤵PID:4508
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4280
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD53b02425a750c9faa35ddfd0951cbc6a2
SHA10a3f9f78ee6ef98c62f099e8c380930cc2633b6a
SHA2564c93c1ff6602eee614978b061eaeb7015fa11e9d6b9c19b3964c66d2ab8d3dab
SHA512627884f53b6da2780604eb78bf9c6bcc06913e00c7503114357ec605fda3a00c228e24ed10446a26d47d9b9fd3463337ed084153dc7d10e6a2e45b3c81057a54
-
Filesize
1.0MB
MD53b02425a750c9faa35ddfd0951cbc6a2
SHA10a3f9f78ee6ef98c62f099e8c380930cc2633b6a
SHA2564c93c1ff6602eee614978b061eaeb7015fa11e9d6b9c19b3964c66d2ab8d3dab
SHA512627884f53b6da2780604eb78bf9c6bcc06913e00c7503114357ec605fda3a00c228e24ed10446a26d47d9b9fd3463337ed084153dc7d10e6a2e45b3c81057a54
-
Filesize
878KB
MD5fec2cc8e8484376e91ba5f4cf4697ac9
SHA1655073c3fd0b12c70dd52e9b9c67bee2f3295121
SHA2561a3dec608e9651b4455eb670eea4fdd764e8f02890a56095a09694a4443d34a4
SHA5127c2cb73b7718cff61df2a509e13d5f26af5c509aa791043c1b8c93e1e938dc53aca74fd22ef1dc8baec6954cf0ee6e7c3cc0188e663a7d19703449688e8eb103
-
Filesize
878KB
MD5fec2cc8e8484376e91ba5f4cf4697ac9
SHA1655073c3fd0b12c70dd52e9b9c67bee2f3295121
SHA2561a3dec608e9651b4455eb670eea4fdd764e8f02890a56095a09694a4443d34a4
SHA5127c2cb73b7718cff61df2a509e13d5f26af5c509aa791043c1b8c93e1e938dc53aca74fd22ef1dc8baec6954cf0ee6e7c3cc0188e663a7d19703449688e8eb103
-
Filesize
584KB
MD50e52996626f0e9714457c6ea08d675d6
SHA1073ac5b88f37dc29d7dbaca50365db04232238ff
SHA256ab3288f0ff5a52266231bddb47904fb3f0648f9017a4724b06ee2c5ebfbb9476
SHA512ed5f2204303ddfb14b0297242b26fcef816fc078a7b1983f9c0f8fef09a8a554ca948e806d844117da30e24d17b1829ac477365b8d42ddd922b74b3fe2ffa6ca
-
Filesize
584KB
MD50e52996626f0e9714457c6ea08d675d6
SHA1073ac5b88f37dc29d7dbaca50365db04232238ff
SHA256ab3288f0ff5a52266231bddb47904fb3f0648f9017a4724b06ee2c5ebfbb9476
SHA512ed5f2204303ddfb14b0297242b26fcef816fc078a7b1983f9c0f8fef09a8a554ca948e806d844117da30e24d17b1829ac477365b8d42ddd922b74b3fe2ffa6ca
-
Filesize
412KB
MD5a543d21b1c69522b950ec37940618f0d
SHA15e0a8b8c441ced8ca0828da3e944785863b605f4
SHA25690acba38795cbed7334564da98456242fb37d6f16f239a495f5b5edcf924a958
SHA5129552d342b0bf478783d5d3b10a4bc47ef058f9fce1d1f23ded4fde3e8c31818fea7a865ae9afccbe2112ac0cfb87c471b64ed8446b1cbdbe185417f1b8b30cd0
-
Filesize
412KB
MD5a543d21b1c69522b950ec37940618f0d
SHA15e0a8b8c441ced8ca0828da3e944785863b605f4
SHA25690acba38795cbed7334564da98456242fb37d6f16f239a495f5b5edcf924a958
SHA5129552d342b0bf478783d5d3b10a4bc47ef058f9fce1d1f23ded4fde3e8c31818fea7a865ae9afccbe2112ac0cfb87c471b64ed8446b1cbdbe185417f1b8b30cd0
-
Filesize
378KB
MD5ed030761f5577cb4972e6f7dab351985
SHA15fcac892fd4d32949b9bb497e98b2b957e3b92e1
SHA256a0c30d0b153beeb306b3123c21e3920da8c1ec128815b224dea81066ed7abf55
SHA5125b8a2597eebb9640ce4fc19f8cbd4bf1ceb8ccf179b1388d7bdafbc3dae662a1870bd864ae9c8e334c31a878abda1574b4066c166bf89d2217ccb7a8c96f4734
-
Filesize
378KB
MD5ed030761f5577cb4972e6f7dab351985
SHA15fcac892fd4d32949b9bb497e98b2b957e3b92e1
SHA256a0c30d0b153beeb306b3123c21e3920da8c1ec128815b224dea81066ed7abf55
SHA5125b8a2597eebb9640ce4fc19f8cbd4bf1ceb8ccf179b1388d7bdafbc3dae662a1870bd864ae9c8e334c31a878abda1574b4066c166bf89d2217ccb7a8c96f4734
-
Filesize
221KB
MD5e403630b1192a3b4be3ad2244a045a05
SHA1f3c98799a0b0199c3cde1399c9e5d9dce97da156
SHA25674c09b01dfbd6906a4280b33c718a3f9cbd4ab6abf8a66a9c49cd2b400a9e9cb
SHA512d58b3cbcbd731a95ad2b9871bab7227dcc43a51e9169c72682cf834963a6cbb8442d96663880d02d534b9c289f6f569f416d9cf6aeebc4a48ed64c740a40d137
-
Filesize
221KB
MD5e403630b1192a3b4be3ad2244a045a05
SHA1f3c98799a0b0199c3cde1399c9e5d9dce97da156
SHA25674c09b01dfbd6906a4280b33c718a3f9cbd4ab6abf8a66a9c49cd2b400a9e9cb
SHA512d58b3cbcbd731a95ad2b9871bab7227dcc43a51e9169c72682cf834963a6cbb8442d96663880d02d534b9c289f6f569f416d9cf6aeebc4a48ed64c740a40d137