Analysis
-
max time kernel
155s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe
Resource
win10v2004-20230915-en
General
-
Target
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe
-
Size
907KB
-
MD5
e2464498f3d62fa7a7002f6fc456c38c
-
SHA1
45b5a8b89ef5c1bf8d074568c29e57bcb35c0146
-
SHA256
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441
-
SHA512
c76303f07e15697751b7db599e0540648b7673512c96bc61cb9399b3d70aa3b7113ec1aadf1958a53c085510a5818ae9a9eb2602279851a6b91e1144c230e040
-
SSDEEP
12288:WMrUy90z5BbPjuqJunQTTb7y6NvviO7fKnToEzUIyJ0j5tyI3R6JaHfSqrqLYgY:qyiBbPTunQHnygx7fKnT3wIB/SqeL/Y
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/3780-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3780-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3780-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3780-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4456 x5628048.exe 2028 x5445000.exe 776 x1558191.exe 1332 g5385333.exe 920 h1643744.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5628048.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5445000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1558191.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1332 set thread context of 3780 1332 g5385333.exe 91 -
Program crash 2 IoCs
pid pid_target Process procid_target 556 3780 WerFault.exe 91 880 1332 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3760 wrote to memory of 4456 3760 c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe 85 PID 3760 wrote to memory of 4456 3760 c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe 85 PID 3760 wrote to memory of 4456 3760 c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe 85 PID 4456 wrote to memory of 2028 4456 x5628048.exe 86 PID 4456 wrote to memory of 2028 4456 x5628048.exe 86 PID 4456 wrote to memory of 2028 4456 x5628048.exe 86 PID 2028 wrote to memory of 776 2028 x5445000.exe 87 PID 2028 wrote to memory of 776 2028 x5445000.exe 87 PID 2028 wrote to memory of 776 2028 x5445000.exe 87 PID 776 wrote to memory of 1332 776 x1558191.exe 88 PID 776 wrote to memory of 1332 776 x1558191.exe 88 PID 776 wrote to memory of 1332 776 x1558191.exe 88 PID 1332 wrote to memory of 1180 1332 g5385333.exe 90 PID 1332 wrote to memory of 1180 1332 g5385333.exe 90 PID 1332 wrote to memory of 1180 1332 g5385333.exe 90 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 1332 wrote to memory of 3780 1332 g5385333.exe 91 PID 776 wrote to memory of 920 776 x1558191.exe 98 PID 776 wrote to memory of 920 776 x1558191.exe 98 PID 776 wrote to memory of 920 776 x1558191.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe"C:\Users\Admin\AppData\Local\Temp\c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5628048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5628048.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5445000.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5445000.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1558191.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1558191.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5385333.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5385333.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 5407⤵
- Program crash
PID:556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 5766⤵
- Program crash
PID:880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1643744.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1643744.exe5⤵
- Executes dropped EXE
PID:920
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3780 -ip 37801⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1332 -ip 13321⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD5e4f04f834aef417d18f6ec2632da735e
SHA15863a89fcc5346c2b3cdfc82a3884655e75982a4
SHA25601b92f4a2e831d2b34c7ab9b42f2d58528dfb49757eb1a4c23d5c9f42cedafe1
SHA5125d6f814c11b0d64ce1d6fe55da8530ae552d37d9c34fa3120ec80f9b44a14c832124475a51e8b44c6e82289664828d48ac3778eb06b01e79e8a6304d487378ce
-
Filesize
805KB
MD5e4f04f834aef417d18f6ec2632da735e
SHA15863a89fcc5346c2b3cdfc82a3884655e75982a4
SHA25601b92f4a2e831d2b34c7ab9b42f2d58528dfb49757eb1a4c23d5c9f42cedafe1
SHA5125d6f814c11b0d64ce1d6fe55da8530ae552d37d9c34fa3120ec80f9b44a14c832124475a51e8b44c6e82289664828d48ac3778eb06b01e79e8a6304d487378ce
-
Filesize
544KB
MD5f136437002dd33e77565b9d51c1595b7
SHA1906b8f996cc4ef639d28c037c7260937c0951579
SHA2560cfe5733fa70125c969b25315324222cf4c760134931657dc4a14a2795122369
SHA51287f9d390075e409c826ebc7d1249747896e53ca53c4fdf714ddbc5f65d83aeea98cda329a3a6c77fb769c19581985e26f1430fb41492999289862865b23c9592
-
Filesize
544KB
MD5f136437002dd33e77565b9d51c1595b7
SHA1906b8f996cc4ef639d28c037c7260937c0951579
SHA2560cfe5733fa70125c969b25315324222cf4c760134931657dc4a14a2795122369
SHA51287f9d390075e409c826ebc7d1249747896e53ca53c4fdf714ddbc5f65d83aeea98cda329a3a6c77fb769c19581985e26f1430fb41492999289862865b23c9592
-
Filesize
379KB
MD5b90d91d16ad4035af19adda96cc7fe70
SHA1883992fb08014f20f5f41866c10b1cb903846203
SHA256948dbb4471314eb3108e198887b23363f72bdc30fab1a64104149638f5eeef28
SHA5129b2ddbf356b0aafb433372c0e88624b0136418899098efd3c15faf6a503dc190a9da3faea56d81ff39a51a7ecff821b2ec52189dd801c46529769c5630122c55
-
Filesize
379KB
MD5b90d91d16ad4035af19adda96cc7fe70
SHA1883992fb08014f20f5f41866c10b1cb903846203
SHA256948dbb4471314eb3108e198887b23363f72bdc30fab1a64104149638f5eeef28
SHA5129b2ddbf356b0aafb433372c0e88624b0136418899098efd3c15faf6a503dc190a9da3faea56d81ff39a51a7ecff821b2ec52189dd801c46529769c5630122c55
-
Filesize
350KB
MD578e70be86b10d5b33ece9b5cea22bb2e
SHA1990294794b018afab625b73eed3f1a13ec4d00f2
SHA25635a71ff1771d5a9e1dfd9852be3750d865b3337eab47665c555ecc0d3a20ee6d
SHA512971ad8d6bf3b8452cd2e25516e481eadc4aa2fc6f98b4cec81db373133832823a91c24fd7b1098ffadbd9afe91380937a108c707d25e303daf1673e070cd6dea
-
Filesize
350KB
MD578e70be86b10d5b33ece9b5cea22bb2e
SHA1990294794b018afab625b73eed3f1a13ec4d00f2
SHA25635a71ff1771d5a9e1dfd9852be3750d865b3337eab47665c555ecc0d3a20ee6d
SHA512971ad8d6bf3b8452cd2e25516e481eadc4aa2fc6f98b4cec81db373133832823a91c24fd7b1098ffadbd9afe91380937a108c707d25e303daf1673e070cd6dea
-
Filesize
174KB
MD55b1daf5f3bdea645a0ef3cc7fc5c15b4
SHA1b5df46a84eb6212228dbe3d1aa9d06ac35fcd07c
SHA256e79d57720bf960b9eafba4d6f0a493d436b199fd019395da8bc09c3010791131
SHA512a9a0cb949a30c4e650f0e6750551638954d07944942cfe7176e7e3c2ce16a8bd18ddee68e616bf37151c828fd7c5c6dacdc685277fa39d4306120671299394f1
-
Filesize
174KB
MD55b1daf5f3bdea645a0ef3cc7fc5c15b4
SHA1b5df46a84eb6212228dbe3d1aa9d06ac35fcd07c
SHA256e79d57720bf960b9eafba4d6f0a493d436b199fd019395da8bc09c3010791131
SHA512a9a0cb949a30c4e650f0e6750551638954d07944942cfe7176e7e3c2ce16a8bd18ddee68e616bf37151c828fd7c5c6dacdc685277fa39d4306120671299394f1