Analysis
-
max time kernel
180s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:42
Static task
static1
Behavioral task
behavioral1
Sample
2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe
Resource
win10v2004-20230915-en
General
-
Target
2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe
-
Size
1.1MB
-
MD5
79be3e9ae32a03c75667c4b94d762313
-
SHA1
15ccadbfb89ff3f984b09d4622f214c4d2781099
-
SHA256
2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be
-
SHA512
af42696ff1f5b4b59076efa62e2c6cd60dad03a019debb8d45f34fd090c632cb66aaaa746977effe68a534b3f71571d14a69e1c34711385b77a1029d2e7806d6
-
SSDEEP
12288:FMrjy90Iln7qSHBeItfk2EnbJzVKMETnauUVnsSMeCb0Tg6mitGAM/4RUf7PiPCj:aytVe3lzPE+VE9Gs/4RY7P2SGKivUJR
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/3808-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3808-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3808-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3808-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2576-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 560 z5742509.exe 1480 z3412810.exe 3600 z5371613.exe 2392 z8084100.exe 1080 q9382285.exe 1248 r8830340.exe 732 s4242752.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5742509.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3412810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5371613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8084100.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1080 set thread context of 2576 1080 q9382285.exe 93 PID 1248 set thread context of 3808 1248 r8830340.exe 102 PID 732 set thread context of 3016 732 s4242752.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 1816 1080 WerFault.exe 91 2332 1248 WerFault.exe 100 5052 3808 WerFault.exe 102 4392 732 WerFault.exe 108 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 AppLaunch.exe 2576 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 AppLaunch.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 4800 wrote to memory of 560 4800 2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe 87 PID 4800 wrote to memory of 560 4800 2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe 87 PID 4800 wrote to memory of 560 4800 2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe 87 PID 560 wrote to memory of 1480 560 z5742509.exe 88 PID 560 wrote to memory of 1480 560 z5742509.exe 88 PID 560 wrote to memory of 1480 560 z5742509.exe 88 PID 1480 wrote to memory of 3600 1480 z3412810.exe 89 PID 1480 wrote to memory of 3600 1480 z3412810.exe 89 PID 1480 wrote to memory of 3600 1480 z3412810.exe 89 PID 3600 wrote to memory of 2392 3600 z5371613.exe 90 PID 3600 wrote to memory of 2392 3600 z5371613.exe 90 PID 3600 wrote to memory of 2392 3600 z5371613.exe 90 PID 2392 wrote to memory of 1080 2392 z8084100.exe 91 PID 2392 wrote to memory of 1080 2392 z8084100.exe 91 PID 2392 wrote to memory of 1080 2392 z8084100.exe 91 PID 1080 wrote to memory of 2576 1080 q9382285.exe 93 PID 1080 wrote to memory of 2576 1080 q9382285.exe 93 PID 1080 wrote to memory of 2576 1080 q9382285.exe 93 PID 1080 wrote to memory of 2576 1080 q9382285.exe 93 PID 1080 wrote to memory of 2576 1080 q9382285.exe 93 PID 1080 wrote to memory of 2576 1080 q9382285.exe 93 PID 1080 wrote to memory of 2576 1080 q9382285.exe 93 PID 1080 wrote to memory of 2576 1080 q9382285.exe 93 PID 2392 wrote to memory of 1248 2392 z8084100.exe 100 PID 2392 wrote to memory of 1248 2392 z8084100.exe 100 PID 2392 wrote to memory of 1248 2392 z8084100.exe 100 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 1248 wrote to memory of 3808 1248 r8830340.exe 102 PID 3600 wrote to memory of 732 3600 z5371613.exe 108 PID 3600 wrote to memory of 732 3600 z5371613.exe 108 PID 3600 wrote to memory of 732 3600 z5371613.exe 108 PID 732 wrote to memory of 2592 732 s4242752.exe 110 PID 732 wrote to memory of 2592 732 s4242752.exe 110 PID 732 wrote to memory of 2592 732 s4242752.exe 110 PID 732 wrote to memory of 3016 732 s4242752.exe 111 PID 732 wrote to memory of 3016 732 s4242752.exe 111 PID 732 wrote to memory of 3016 732 s4242752.exe 111 PID 732 wrote to memory of 3016 732 s4242752.exe 111 PID 732 wrote to memory of 3016 732 s4242752.exe 111 PID 732 wrote to memory of 3016 732 s4242752.exe 111 PID 732 wrote to memory of 3016 732 s4242752.exe 111 PID 732 wrote to memory of 3016 732 s4242752.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe"C:\Users\Admin\AppData\Local\Temp\2d5146b5be09fe914343d03e2738109b089433d266a55090e5a7c6816e1051be.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5742509.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5742509.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3412810.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3412810.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5371613.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5371613.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8084100.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8084100.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9382285.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9382285.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 5887⤵
- Program crash
PID:1816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8830340.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8830340.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 5408⤵
- Program crash
PID:5052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 5967⤵
- Program crash
PID:2332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4242752.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4242752.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 6006⤵
- Program crash
PID:4392
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1080 -ip 10801⤵PID:812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1248 -ip 12481⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3808 -ip 38081⤵PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 732 -ip 7321⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
984KB
MD55d49400615f5f82ec64936848df07e3e
SHA172257b99baf01263622a4e97b4aa69c97a5933fb
SHA25610f8d1465d3066e44efcf70fea4fac8906d4ac19ebc51737207891acee5406ca
SHA512c410067cbe8ed4d959fc0479e74a21e108bee75399882dc7000d2662105bebb3bae22545ca22dc540b49e254129d7a79e7c216ee8e406b4a2492684caaab0cc9
-
Filesize
984KB
MD55d49400615f5f82ec64936848df07e3e
SHA172257b99baf01263622a4e97b4aa69c97a5933fb
SHA25610f8d1465d3066e44efcf70fea4fac8906d4ac19ebc51737207891acee5406ca
SHA512c410067cbe8ed4d959fc0479e74a21e108bee75399882dc7000d2662105bebb3bae22545ca22dc540b49e254129d7a79e7c216ee8e406b4a2492684caaab0cc9
-
Filesize
800KB
MD50dec50e77485bbef6a821e5d64d742af
SHA18df990f1ac74f8da896ce2456b10f1cd7f4e4560
SHA2566e0c1c981b8b8910d5ae305eaa6cee132f50885c97d26139edeb35649fbd32e8
SHA5129be815761e2fbb8344b3c170ba2e39ed4619e5c263e9805a31218ea4c6ea73941f35a45edaeb14e22929c562286959a6324ca5ade573186ffe8351073838b28a
-
Filesize
800KB
MD50dec50e77485bbef6a821e5d64d742af
SHA18df990f1ac74f8da896ce2456b10f1cd7f4e4560
SHA2566e0c1c981b8b8910d5ae305eaa6cee132f50885c97d26139edeb35649fbd32e8
SHA5129be815761e2fbb8344b3c170ba2e39ed4619e5c263e9805a31218ea4c6ea73941f35a45edaeb14e22929c562286959a6324ca5ade573186ffe8351073838b28a
-
Filesize
617KB
MD50241245852d8e5f0f87734d0c670ab84
SHA1e4c78401438ae2557b6dccfa4044b7ca01e61019
SHA256e8a94879e746a5df35e69653abbbda28d4c7187ed70a91e306f1db24f1fab1da
SHA512bb43b19af82d0c61f2d35644efd75373715fde0359027db71ac0e6081b2f8bece684e68c9d2dc195570bb336e5ae21bfcca01b4f751fd3c405d699dd56eae3b3
-
Filesize
617KB
MD50241245852d8e5f0f87734d0c670ab84
SHA1e4c78401438ae2557b6dccfa4044b7ca01e61019
SHA256e8a94879e746a5df35e69653abbbda28d4c7187ed70a91e306f1db24f1fab1da
SHA512bb43b19af82d0c61f2d35644efd75373715fde0359027db71ac0e6081b2f8bece684e68c9d2dc195570bb336e5ae21bfcca01b4f751fd3c405d699dd56eae3b3
-
Filesize
390KB
MD530bf2ffc35ac82dfe235a182757acab0
SHA12683191fde85ec3cf468bec2c0e6b2ffc882852d
SHA2564bda52f6d1e0247ee7033297552e54b49576fbc954e15790c1491553c88bcc5c
SHA512788ffc870691ccf8f5fd9b346c553903ac7b8da54b3fe3f403ba1d17fee7a81cc19a3d88de948a5443dbb4a0a2097542e2d10e11338e53bde225f02922b53111
-
Filesize
390KB
MD530bf2ffc35ac82dfe235a182757acab0
SHA12683191fde85ec3cf468bec2c0e6b2ffc882852d
SHA2564bda52f6d1e0247ee7033297552e54b49576fbc954e15790c1491553c88bcc5c
SHA512788ffc870691ccf8f5fd9b346c553903ac7b8da54b3fe3f403ba1d17fee7a81cc19a3d88de948a5443dbb4a0a2097542e2d10e11338e53bde225f02922b53111
-
Filesize
347KB
MD5d04725606634f4e537bb54544bcadd24
SHA157f4ca1bfa119a3899922b4e70308f91b6ccc8a5
SHA256aa31c97d3f23ce7a7f9516adad4f8f81ddce285ff127b1eb27885dfa7fdeccb3
SHA5123f7e8f4432faf1130c1bd2661dab14c9cfdf0979911f17646f295d65b72bf969c0f81e5d6e107a901b487c3dd6fc13fe709abe30460775dd109b3a16bf09fdfd
-
Filesize
347KB
MD5d04725606634f4e537bb54544bcadd24
SHA157f4ca1bfa119a3899922b4e70308f91b6ccc8a5
SHA256aa31c97d3f23ce7a7f9516adad4f8f81ddce285ff127b1eb27885dfa7fdeccb3
SHA5123f7e8f4432faf1130c1bd2661dab14c9cfdf0979911f17646f295d65b72bf969c0f81e5d6e107a901b487c3dd6fc13fe709abe30460775dd109b3a16bf09fdfd
-
Filesize
227KB
MD5489b2308164e5068cc1f44437f695214
SHA19e86b727c5ad1abf992e77a2a64a2b23e6b368bd
SHA25668dbf79241f91ea05b8e97e060a3f0904958921e6b86fc03e61ca235e73d7dd9
SHA512cb0fb7598f00f07d0d829542b0bde78e9b23cd44fa87b9fd9651d6c1665df4eb91efaa4ad986592060efd3cd6f8b05a9fbd4d3576c9ab9fcd54b852f5a186a3e
-
Filesize
227KB
MD5489b2308164e5068cc1f44437f695214
SHA19e86b727c5ad1abf992e77a2a64a2b23e6b368bd
SHA25668dbf79241f91ea05b8e97e060a3f0904958921e6b86fc03e61ca235e73d7dd9
SHA512cb0fb7598f00f07d0d829542b0bde78e9b23cd44fa87b9fd9651d6c1665df4eb91efaa4ad986592060efd3cd6f8b05a9fbd4d3576c9ab9fcd54b852f5a186a3e
-
Filesize
356KB
MD556a68b109a9931cc26feb11f5e1741ab
SHA1f09b00547ae7a3493cb14ceb90feb42f7005ead3
SHA256a07c52a12a6deb90d432f93d7c6fe3ef076dbefccac7cdadf0605aaabae2f1dd
SHA5128b955c3ab9dc384d6fbebd3bcff50815310d86148645d5819f3cb85c520668c179e8fdc017da698698f6ed9812ca5f8581b81cf9c319005aefd630e6ef1e9a2f
-
Filesize
356KB
MD556a68b109a9931cc26feb11f5e1741ab
SHA1f09b00547ae7a3493cb14ceb90feb42f7005ead3
SHA256a07c52a12a6deb90d432f93d7c6fe3ef076dbefccac7cdadf0605aaabae2f1dd
SHA5128b955c3ab9dc384d6fbebd3bcff50815310d86148645d5819f3cb85c520668c179e8fdc017da698698f6ed9812ca5f8581b81cf9c319005aefd630e6ef1e9a2f