Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe
Resource
win10v2004-20230915-en
General
-
Target
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe
-
Size
907KB
-
MD5
d616908509e9883f36385ffb9d9e81c3
-
SHA1
486d67f400c41fe42c0edbadf1f7b1118fdca355
-
SHA256
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc
-
SHA512
2f93b714aaba7b054f9673193084505c5da932031eecc668806cdabde9ed3349c9ddf02ff84276a0c43007494e3473b3367dc3113efc2ffdae7504df45ee3baf
-
SSDEEP
12288:pMrty90qFZSi7NS6+OY04Lr6W7rmpJ+6nJOfpvDKJXx9mv9omv9sLVJ2LvKDs4UV:AyNZbNnqMHOxgABI2LALg4oQwaFs
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4684-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4684-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4684-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4684-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4616 x9275033.exe 4700 x2925570.exe 2092 x3337893.exe 3784 g3036857.exe 5052 h7583879.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9275033.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2925570.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3337893.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3784 set thread context of 4684 3784 g3036857.exe 88 -
Program crash 2 IoCs
pid pid_target Process procid_target 3928 4684 WerFault.exe 88 2560 3784 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1264 wrote to memory of 4616 1264 54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe 84 PID 1264 wrote to memory of 4616 1264 54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe 84 PID 1264 wrote to memory of 4616 1264 54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe 84 PID 4616 wrote to memory of 4700 4616 x9275033.exe 85 PID 4616 wrote to memory of 4700 4616 x9275033.exe 85 PID 4616 wrote to memory of 4700 4616 x9275033.exe 85 PID 4700 wrote to memory of 2092 4700 x2925570.exe 86 PID 4700 wrote to memory of 2092 4700 x2925570.exe 86 PID 4700 wrote to memory of 2092 4700 x2925570.exe 86 PID 2092 wrote to memory of 3784 2092 x3337893.exe 87 PID 2092 wrote to memory of 3784 2092 x3337893.exe 87 PID 2092 wrote to memory of 3784 2092 x3337893.exe 87 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 3784 wrote to memory of 4684 3784 g3036857.exe 88 PID 2092 wrote to memory of 5052 2092 x3337893.exe 94 PID 2092 wrote to memory of 5052 2092 x3337893.exe 94 PID 2092 wrote to memory of 5052 2092 x3337893.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe"C:\Users\Admin\AppData\Local\Temp\54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9275033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9275033.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2925570.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2925570.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3337893.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3337893.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3036857.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3036857.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 5407⤵
- Program crash
PID:3928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 5526⤵
- Program crash
PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7583879.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7583879.exe5⤵
- Executes dropped EXE
PID:5052
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3784 -ip 37841⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4684 -ip 46841⤵PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD50411adc513784270e2d87e2db15a2c92
SHA161fc634e13084bf025d19ff790556c99dd6bfc56
SHA256cef749f25b9206c3924ef8429505f28ff69903de88c4e7415a7842f606f107ea
SHA512401c3bde03d3964ab8e943fc6fc3fe7e7ca1a5467aba0f093f766b6830aa12db4c8542293eae1e31c491cf5f483e7e61591ea3b00bb12afc3ef1b26f4c3ac20d
-
Filesize
805KB
MD50411adc513784270e2d87e2db15a2c92
SHA161fc634e13084bf025d19ff790556c99dd6bfc56
SHA256cef749f25b9206c3924ef8429505f28ff69903de88c4e7415a7842f606f107ea
SHA512401c3bde03d3964ab8e943fc6fc3fe7e7ca1a5467aba0f093f766b6830aa12db4c8542293eae1e31c491cf5f483e7e61591ea3b00bb12afc3ef1b26f4c3ac20d
-
Filesize
545KB
MD53b957b9ae981af805498bfbdc598456b
SHA16e51e31cbb7da0c668d7d2d4ab69402812f9a21d
SHA256babcfbbae56226d8264b2a7be09aebc5f9b72a64896caf1a7af1f4ed6203b41d
SHA5123dc5f8780ccf3ded70e7f0467aa725bd1f0821d6d1be29ceb2fa58d4ec5725edb05f7597b84302257b54ef474948849d82dbb6ee468bfb6b986ac55991d044b3
-
Filesize
545KB
MD53b957b9ae981af805498bfbdc598456b
SHA16e51e31cbb7da0c668d7d2d4ab69402812f9a21d
SHA256babcfbbae56226d8264b2a7be09aebc5f9b72a64896caf1a7af1f4ed6203b41d
SHA5123dc5f8780ccf3ded70e7f0467aa725bd1f0821d6d1be29ceb2fa58d4ec5725edb05f7597b84302257b54ef474948849d82dbb6ee468bfb6b986ac55991d044b3
-
Filesize
379KB
MD596763d6b47056e2fd4026a3fa2ec798f
SHA1bdd5c17f257702861b88237e9b38959886ce43ec
SHA256551fb60429c7ad203eb4b8efb17766250778315a21ee460246d71947219315f3
SHA51297e7794b0a2f3c4aae4083c1daf6602d1214cf240b48b5496d9700534e2f56778930873410b8624ab65006e6c187ac50b98ebe57959542db1fe3804211b20328
-
Filesize
379KB
MD596763d6b47056e2fd4026a3fa2ec798f
SHA1bdd5c17f257702861b88237e9b38959886ce43ec
SHA256551fb60429c7ad203eb4b8efb17766250778315a21ee460246d71947219315f3
SHA51297e7794b0a2f3c4aae4083c1daf6602d1214cf240b48b5496d9700534e2f56778930873410b8624ab65006e6c187ac50b98ebe57959542db1fe3804211b20328
-
Filesize
350KB
MD5fda434a977402b6844f3723e18d486bd
SHA1c4da98374afc11b79d2455aed30fa30e18cd3afd
SHA2563ca6c8fa0e45c360a78b9be55080ce8ec7a9b0e8903d1ccddf359e5a3e031f40
SHA512df837602f8e453dccbef544716c0df3c48fafe8536a2e450fad9854b6d6d072d1a5a364275fd3130bb09ef064ab9326873bd9ceb0dd10e15ffbdba22c49e29df
-
Filesize
350KB
MD5fda434a977402b6844f3723e18d486bd
SHA1c4da98374afc11b79d2455aed30fa30e18cd3afd
SHA2563ca6c8fa0e45c360a78b9be55080ce8ec7a9b0e8903d1ccddf359e5a3e031f40
SHA512df837602f8e453dccbef544716c0df3c48fafe8536a2e450fad9854b6d6d072d1a5a364275fd3130bb09ef064ab9326873bd9ceb0dd10e15ffbdba22c49e29df
-
Filesize
174KB
MD58480c2330f55aac717cbe0e152a42ee2
SHA1b1f38b67aee59a5514a1b151f893f25886f16ba2
SHA256dd0f7d3babd405a7c169d461208c3a558957f83728fb1e6421fd568c0c36b02f
SHA51211a0de752f24d1ff0387e9dc0ccc4d60fd989de84f653a33623f7bc5be5b29a2881f0e076fc5cf1b0d3803e1eb0df37e1682c8a5a7bf5d0de8c490bb5e227a75
-
Filesize
174KB
MD58480c2330f55aac717cbe0e152a42ee2
SHA1b1f38b67aee59a5514a1b151f893f25886f16ba2
SHA256dd0f7d3babd405a7c169d461208c3a558957f83728fb1e6421fd568c0c36b02f
SHA51211a0de752f24d1ff0387e9dc0ccc4d60fd989de84f653a33623f7bc5be5b29a2881f0e076fc5cf1b0d3803e1eb0df37e1682c8a5a7bf5d0de8c490bb5e227a75