Analysis
-
max time kernel
162s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:31
Static task
static1
Behavioral task
behavioral1
Sample
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe
Resource
win10v2004-20230915-en
General
-
Target
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe
-
Size
912KB
-
MD5
d543b9735c540cc6703db59e7cdc901b
-
SHA1
afe133337f5a4e369a6ea0b1b343396877deb4ee
-
SHA256
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb
-
SHA512
753e225c1cb2e201f1ce9e9dbcd872ff8973dd6f5e0b3cf29e9d7185c7faaebaae12fb573f182d57d0715432ec7c6d74eae872dbab9a5c01f0d989fc772335f0
-
SSDEEP
24576:6y/N4VI3ja2E40UXN7eKmsqV1B7Aj5Pv:BVg0a3UXdeKm93B7Aj
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/5020-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5020-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5020-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5020-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4476 x1645971.exe 4692 x3889697.exe 4200 x5554897.exe 4644 g5814111.exe 3376 h0291056.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1645971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3889697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5554897.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4644 set thread context of 5020 4644 g5814111.exe 91 -
Program crash 2 IoCs
pid pid_target Process procid_target 1952 4644 WerFault.exe 89 1048 5020 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4476 2260 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 86 PID 2260 wrote to memory of 4476 2260 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 86 PID 2260 wrote to memory of 4476 2260 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 86 PID 4476 wrote to memory of 4692 4476 x1645971.exe 87 PID 4476 wrote to memory of 4692 4476 x1645971.exe 87 PID 4476 wrote to memory of 4692 4476 x1645971.exe 87 PID 4692 wrote to memory of 4200 4692 x3889697.exe 88 PID 4692 wrote to memory of 4200 4692 x3889697.exe 88 PID 4692 wrote to memory of 4200 4692 x3889697.exe 88 PID 4200 wrote to memory of 4644 4200 x5554897.exe 89 PID 4200 wrote to memory of 4644 4200 x5554897.exe 89 PID 4200 wrote to memory of 4644 4200 x5554897.exe 89 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4644 wrote to memory of 5020 4644 g5814111.exe 91 PID 4200 wrote to memory of 3376 4200 x5554897.exe 97 PID 4200 wrote to memory of 3376 4200 x5554897.exe 97 PID 4200 wrote to memory of 3376 4200 x5554897.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe"C:\Users\Admin\AppData\Local\Temp\f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 5447⤵
- Program crash
PID:1048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 5846⤵
- Program crash
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0291056.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0291056.exe5⤵
- Executes dropped EXE
PID:3376
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4644 -ip 46441⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5020 -ip 50201⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810KB
MD5547bde822515107c33b466b8f698fbff
SHA12b859679fe3c1177cb8e539680525e30c4294083
SHA25651f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679
SHA512f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab
-
Filesize
810KB
MD5547bde822515107c33b466b8f698fbff
SHA12b859679fe3c1177cb8e539680525e30c4294083
SHA25651f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679
SHA512f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab
-
Filesize
547KB
MD5c1095508e8fabac0fc8e7cbe847ef1ba
SHA1bb98031602538985e71476aa4acc5e329c2060dc
SHA2567e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8
SHA5121e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f
-
Filesize
547KB
MD5c1095508e8fabac0fc8e7cbe847ef1ba
SHA1bb98031602538985e71476aa4acc5e329c2060dc
SHA2567e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8
SHA5121e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f
-
Filesize
381KB
MD59b9a1df7abee3c46c609d68ec66954b3
SHA1616e616ae8662aa9afc08b6e2a8d45b0d627959f
SHA2566075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e
SHA51208ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d
-
Filesize
381KB
MD59b9a1df7abee3c46c609d68ec66954b3
SHA1616e616ae8662aa9afc08b6e2a8d45b0d627959f
SHA2566075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e
SHA51208ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
174KB
MD5a1a43aa480c8ecc6bc431c6ab813d70e
SHA1482a5162533d7896d8076a0507cb413a4716a639
SHA256001f85019463198c07d63caa990abc723653d16e44602e4f79ee6e278b900489
SHA51272ff8d141e1a4146bfd5715ffe55336c55e2d8083be7ebc5eb68f66c30dcb39e04c94d23354eea79f2fbe41a683ced7e35c1158a659ac6dd04b99d6699d20260
-
Filesize
174KB
MD5a1a43aa480c8ecc6bc431c6ab813d70e
SHA1482a5162533d7896d8076a0507cb413a4716a639
SHA256001f85019463198c07d63caa990abc723653d16e44602e4f79ee6e278b900489
SHA51272ff8d141e1a4146bfd5715ffe55336c55e2d8083be7ebc5eb68f66c30dcb39e04c94d23354eea79f2fbe41a683ced7e35c1158a659ac6dd04b99d6699d20260