Analysis
-
max time kernel
210s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 23:01
Static task
static1
Behavioral task
behavioral1
Sample
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe
Resource
win10v2004-20230915-en
General
-
Target
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe
-
Size
1.1MB
-
MD5
0c64d372fdc96ace35f0a777de7c907a
-
SHA1
9718eb5e3fa23eee279b111ed794fb79aa449701
-
SHA256
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674
-
SHA512
ebf0719226a5839c32a6d2c5d93115ebcd9b3e940c749b7d33276fa23cbe244f416818e067960a9bed6b0fdfa9880d5850196af9e9a8a4a0ab6ec9bc82c770b0
-
SSDEEP
24576:xySTAV9F83DtXNsabc221afMotMa09p92RkaIOb:kST483lNsaIeL+a0F2R
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/3120-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3120-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3120-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3120-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1848-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3404 z9535555.exe 4388 z7593087.exe 4892 z8275524.exe 564 z5150266.exe 640 q6849161.exe 3096 r9977775.exe 3732 s4686811.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8275524.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5150266.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9535555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7593087.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 640 set thread context of 1848 640 q6849161.exe 93 PID 3096 set thread context of 3120 3096 r9977775.exe 102 PID 3732 set thread context of 2380 3732 s4686811.exe 110 -
Program crash 4 IoCs
pid pid_target Process procid_target 4800 640 WerFault.exe 91 2148 3096 WerFault.exe 100 380 3120 WerFault.exe 102 1384 3732 WerFault.exe 108 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1848 AppLaunch.exe 1848 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1848 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3712 wrote to memory of 3404 3712 019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe 86 PID 3712 wrote to memory of 3404 3712 019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe 86 PID 3712 wrote to memory of 3404 3712 019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe 86 PID 3404 wrote to memory of 4388 3404 z9535555.exe 87 PID 3404 wrote to memory of 4388 3404 z9535555.exe 87 PID 3404 wrote to memory of 4388 3404 z9535555.exe 87 PID 4388 wrote to memory of 4892 4388 z7593087.exe 88 PID 4388 wrote to memory of 4892 4388 z7593087.exe 88 PID 4388 wrote to memory of 4892 4388 z7593087.exe 88 PID 4892 wrote to memory of 564 4892 z8275524.exe 89 PID 4892 wrote to memory of 564 4892 z8275524.exe 89 PID 4892 wrote to memory of 564 4892 z8275524.exe 89 PID 564 wrote to memory of 640 564 z5150266.exe 91 PID 564 wrote to memory of 640 564 z5150266.exe 91 PID 564 wrote to memory of 640 564 z5150266.exe 91 PID 640 wrote to memory of 1848 640 q6849161.exe 93 PID 640 wrote to memory of 1848 640 q6849161.exe 93 PID 640 wrote to memory of 1848 640 q6849161.exe 93 PID 640 wrote to memory of 1848 640 q6849161.exe 93 PID 640 wrote to memory of 1848 640 q6849161.exe 93 PID 640 wrote to memory of 1848 640 q6849161.exe 93 PID 640 wrote to memory of 1848 640 q6849161.exe 93 PID 640 wrote to memory of 1848 640 q6849161.exe 93 PID 564 wrote to memory of 3096 564 z5150266.exe 100 PID 564 wrote to memory of 3096 564 z5150266.exe 100 PID 564 wrote to memory of 3096 564 z5150266.exe 100 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 3096 wrote to memory of 3120 3096 r9977775.exe 102 PID 4892 wrote to memory of 3732 4892 z8275524.exe 108 PID 4892 wrote to memory of 3732 4892 z8275524.exe 108 PID 4892 wrote to memory of 3732 4892 z8275524.exe 108 PID 3732 wrote to memory of 2380 3732 s4686811.exe 110 PID 3732 wrote to memory of 2380 3732 s4686811.exe 110 PID 3732 wrote to memory of 2380 3732 s4686811.exe 110 PID 3732 wrote to memory of 2380 3732 s4686811.exe 110 PID 3732 wrote to memory of 2380 3732 s4686811.exe 110 PID 3732 wrote to memory of 2380 3732 s4686811.exe 110 PID 3732 wrote to memory of 2380 3732 s4686811.exe 110 PID 3732 wrote to memory of 2380 3732 s4686811.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe"C:\Users\Admin\AppData\Local\Temp\019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9535555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9535555.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7593087.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7593087.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8275524.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8275524.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5150266.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5150266.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6849161.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6849161.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 5967⤵
- Program crash
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9977775.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9977775.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 5408⤵
- Program crash
PID:380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1527⤵
- Program crash
PID:2148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4686811.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4686811.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 5846⤵
- Program crash
PID:1384
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 640 -ip 6401⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3096 -ip 30961⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3120 -ip 31201⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3732 -ip 37321⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
982KB
MD58d2a632420e9e71a0aca6db6ac9977a6
SHA12b5e1c9a09a4fd9eef24bcab921287e6ef142987
SHA256d2524dac62e38fc5c3e82b59ff1e7ba60183b5a4d0bc7eccf085c0d7f56163e7
SHA512c506cb8d742e2c95ff0d558c075ceff28a347b82f1983e7a08da804a94f4e34a11891a430248c6d61587ecde3ba27cad9467e2623b91f740171f861c0eb62ad3
-
Filesize
982KB
MD58d2a632420e9e71a0aca6db6ac9977a6
SHA12b5e1c9a09a4fd9eef24bcab921287e6ef142987
SHA256d2524dac62e38fc5c3e82b59ff1e7ba60183b5a4d0bc7eccf085c0d7f56163e7
SHA512c506cb8d742e2c95ff0d558c075ceff28a347b82f1983e7a08da804a94f4e34a11891a430248c6d61587ecde3ba27cad9467e2623b91f740171f861c0eb62ad3
-
Filesize
799KB
MD516423ac206936c6b26a774559de20fca
SHA1993050c899e8eeb7a138742ab89be57335ac3290
SHA2562fe82e2ab3a62a7e3e6f9f7bfae127f48eb39618d29df67b60d7bece58f4dddf
SHA512ee2fecf3a5f320b67b78a11c4bbc7f50ac9b3072daf1ea2736f0fe83e9492a230a8046475165a94dcf3793f083f8e63e9ed0a53f9751740abb8c9137c709d328
-
Filesize
799KB
MD516423ac206936c6b26a774559de20fca
SHA1993050c899e8eeb7a138742ab89be57335ac3290
SHA2562fe82e2ab3a62a7e3e6f9f7bfae127f48eb39618d29df67b60d7bece58f4dddf
SHA512ee2fecf3a5f320b67b78a11c4bbc7f50ac9b3072daf1ea2736f0fe83e9492a230a8046475165a94dcf3793f083f8e63e9ed0a53f9751740abb8c9137c709d328
-
Filesize
616KB
MD55fa6a564a4a4ae9da4ce6c9cad74dc3a
SHA1b44cef355e675f44e3a99514629707c717494a18
SHA25663130455466f68b60955f4d4cec2477e57f75a2562e86eb68e75daa3ee190708
SHA51250245a723f3fba2a7a3f96985caad3272f6b1f91a0d5ed021bbb763fffc7fc62c45ee9f9ac8ed901b6f4121c670f9b836dc391fa16d16de20f738b133b520659
-
Filesize
616KB
MD55fa6a564a4a4ae9da4ce6c9cad74dc3a
SHA1b44cef355e675f44e3a99514629707c717494a18
SHA25663130455466f68b60955f4d4cec2477e57f75a2562e86eb68e75daa3ee190708
SHA51250245a723f3fba2a7a3f96985caad3272f6b1f91a0d5ed021bbb763fffc7fc62c45ee9f9ac8ed901b6f4121c670f9b836dc391fa16d16de20f738b133b520659
-
Filesize
390KB
MD5717a6b24b995c40962ed9b4814396e77
SHA1839c20620c21eadc1cf77dccce246248f93be3f4
SHA2564ec203efe214ff4822b8149265a83e80b88355eafb2521541d17d5b320b3276a
SHA512d2fa4e1f257ad7950001b927834ba894588c7e90873ab0b60e6308551a0b7f19264129ede7579e86a636d2e64b007fe48714a516a62f674e6171f05e9674171c
-
Filesize
390KB
MD5717a6b24b995c40962ed9b4814396e77
SHA1839c20620c21eadc1cf77dccce246248f93be3f4
SHA2564ec203efe214ff4822b8149265a83e80b88355eafb2521541d17d5b320b3276a
SHA512d2fa4e1f257ad7950001b927834ba894588c7e90873ab0b60e6308551a0b7f19264129ede7579e86a636d2e64b007fe48714a516a62f674e6171f05e9674171c
-
Filesize
346KB
MD5e7921a7afacc53f28b168407fb300780
SHA14cf6074dfdb29d25c31dd3bad9379f4a3302db8e
SHA2562448ad1b25e596c0b68d77fd6ada33ccdfcd07326aa2b1fdce9a3c36048871e0
SHA512e602996f4c54dbbf9e2a302d90aa3c8e70a8c397eb0bf5b24d94441ee976517dfc49244b76b10b009f0c59803c030b641d736a52cd214c5e9934e8ab380e016f
-
Filesize
346KB
MD5e7921a7afacc53f28b168407fb300780
SHA14cf6074dfdb29d25c31dd3bad9379f4a3302db8e
SHA2562448ad1b25e596c0b68d77fd6ada33ccdfcd07326aa2b1fdce9a3c36048871e0
SHA512e602996f4c54dbbf9e2a302d90aa3c8e70a8c397eb0bf5b24d94441ee976517dfc49244b76b10b009f0c59803c030b641d736a52cd214c5e9934e8ab380e016f
-
Filesize
227KB
MD5b1d477e91870b25e115e978923fe3994
SHA163946ba95970b2fcd30de32782655c78a30a6bbd
SHA256dffa054030059d50ddb4d0dc819f94fedd01752e0a7244794b021ab907d9c1cf
SHA5121e0459e64cd07f1e045fb68ce18b3bdc417bf5f5212db014a1683f792ffe15490d3f40cbd9baf2ba0a10612483e522f085cccc2325239a0a24c9023a07356ab9
-
Filesize
227KB
MD5b1d477e91870b25e115e978923fe3994
SHA163946ba95970b2fcd30de32782655c78a30a6bbd
SHA256dffa054030059d50ddb4d0dc819f94fedd01752e0a7244794b021ab907d9c1cf
SHA5121e0459e64cd07f1e045fb68ce18b3bdc417bf5f5212db014a1683f792ffe15490d3f40cbd9baf2ba0a10612483e522f085cccc2325239a0a24c9023a07356ab9
-
Filesize
356KB
MD533cc83096daa133112e8cf3883a5936a
SHA1a6a0e4725e8d4ae31e6bab127c0aceef9c3ff546
SHA256e3bf8073e8a367abf1536dc0c04f18f383aae7cccc33040c76833351f1641f81
SHA512fc87e64ff0e77e500e12cf10c3aaa767364af49d0d5df083848eb963d1f77d0fe4775dd56277e2270b92661d99ba2dd6dc7cb66e6f8b0b60c35bbd2ab79bd7dd
-
Filesize
356KB
MD533cc83096daa133112e8cf3883a5936a
SHA1a6a0e4725e8d4ae31e6bab127c0aceef9c3ff546
SHA256e3bf8073e8a367abf1536dc0c04f18f383aae7cccc33040c76833351f1641f81
SHA512fc87e64ff0e77e500e12cf10c3aaa767364af49d0d5df083848eb963d1f77d0fe4775dd56277e2270b92661d99ba2dd6dc7cb66e6f8b0b60c35bbd2ab79bd7dd