Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe
Resource
win10v2004-20230915-en
General
-
Target
49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe
-
Size
930KB
-
MD5
dee317ba76524501164b8171c6071f12
-
SHA1
6844cc3a1b9946ac1003b7b1acd324436d0f6591
-
SHA256
49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402
-
SHA512
b16403778a6b077dc41365026375c55db52f3f77b5347214ca26c31c2eb2597cddda2c1c8722970e8db63d8b749bdcede78e6dae49e86234c78ab112119723ab
-
SSDEEP
12288:CMr+y90cuna7bguPyLi3yQZOMHQYuH/YzWAsQYyX1dIlVms2tpLBaxNgBa6eT+00:Ay9KaHgQoi3yXZYs/aWoleykzoXmI
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/5064-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5064-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5064-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5064-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4648 x7285651.exe 3752 x3213608.exe 3524 x8826957.exe 3544 g5911810.exe 1660 h3343260.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7285651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3213608.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8826957.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3544 set thread context of 5064 3544 g5911810.exe 92 -
Program crash 2 IoCs
pid pid_target Process procid_target 2056 3544 WerFault.exe 91 4992 5064 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4648 4236 49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe 88 PID 4236 wrote to memory of 4648 4236 49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe 88 PID 4236 wrote to memory of 4648 4236 49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe 88 PID 4648 wrote to memory of 3752 4648 x7285651.exe 89 PID 4648 wrote to memory of 3752 4648 x7285651.exe 89 PID 4648 wrote to memory of 3752 4648 x7285651.exe 89 PID 3752 wrote to memory of 3524 3752 x3213608.exe 90 PID 3752 wrote to memory of 3524 3752 x3213608.exe 90 PID 3752 wrote to memory of 3524 3752 x3213608.exe 90 PID 3524 wrote to memory of 3544 3524 x8826957.exe 91 PID 3524 wrote to memory of 3544 3524 x8826957.exe 91 PID 3524 wrote to memory of 3544 3524 x8826957.exe 91 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3544 wrote to memory of 5064 3544 g5911810.exe 92 PID 3524 wrote to memory of 1660 3524 x8826957.exe 99 PID 3524 wrote to memory of 1660 3524 x8826957.exe 99 PID 3524 wrote to memory of 1660 3524 x8826957.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe"C:\Users\Admin\AppData\Local\Temp\49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7285651.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7285651.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3213608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3213608.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8826957.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8826957.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5911810.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5911810.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 5407⤵
- Program crash
PID:4992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 5566⤵
- Program crash
PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3343260.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3343260.exe5⤵
- Executes dropped EXE
PID:1660
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5064 -ip 50641⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3544 -ip 35441⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD542109192c04a35fb0c05b4795115c75e
SHA16904ea1135f46027bf3f3bb41365d38fac796872
SHA2563a16fc0495736fe867a800c4d5ccb1abd68b1ab2e8f3e281565227401432616a
SHA51280d0da6f8a60ce1a17951912ce33000d6d60ff1e0023a8678f8feef269a9487977a9442bd3063f80e7a11789e7791951d053aca8a2426e8d2f231c5773f219a5
-
Filesize
828KB
MD542109192c04a35fb0c05b4795115c75e
SHA16904ea1135f46027bf3f3bb41365d38fac796872
SHA2563a16fc0495736fe867a800c4d5ccb1abd68b1ab2e8f3e281565227401432616a
SHA51280d0da6f8a60ce1a17951912ce33000d6d60ff1e0023a8678f8feef269a9487977a9442bd3063f80e7a11789e7791951d053aca8a2426e8d2f231c5773f219a5
-
Filesize
556KB
MD5d3fd8597deb48597abff0561760c0de7
SHA1714a957e0f35d55822e9f6df201a36e7fce8dc2b
SHA256223b616c22fe3459a67ef99c0fdac623798e08272b85d8a2b48b12b9c7636e81
SHA5121f42fba78995b80adc188bdc5d23406dca97b20306ecca12b44e58d30a6ad50849b591161bd2d3ce6e045d5ac5318ebe4ddd51145d4b0d79d50bcc3598f51988
-
Filesize
556KB
MD5d3fd8597deb48597abff0561760c0de7
SHA1714a957e0f35d55822e9f6df201a36e7fce8dc2b
SHA256223b616c22fe3459a67ef99c0fdac623798e08272b85d8a2b48b12b9c7636e81
SHA5121f42fba78995b80adc188bdc5d23406dca97b20306ecca12b44e58d30a6ad50849b591161bd2d3ce6e045d5ac5318ebe4ddd51145d4b0d79d50bcc3598f51988
-
Filesize
390KB
MD57e116a8f66f508374e056f16f855bdb5
SHA19698b5d7dd5c0feda7ef1badf3a3a12fcb0f235f
SHA25697ebc1f6f7e35a21cd98a12ff15febf17683dea2aad02879961d8f89b6b6bd0e
SHA512ca217892d36fc914fe03c42684ab3734f3f47fdf62a85e92901df688a5434c6a54b0d4153b7ee77c150cf073d87b308bfa5b1dbf96b8783cacfaff83d7ff062f
-
Filesize
390KB
MD57e116a8f66f508374e056f16f855bdb5
SHA19698b5d7dd5c0feda7ef1badf3a3a12fcb0f235f
SHA25697ebc1f6f7e35a21cd98a12ff15febf17683dea2aad02879961d8f89b6b6bd0e
SHA512ca217892d36fc914fe03c42684ab3734f3f47fdf62a85e92901df688a5434c6a54b0d4153b7ee77c150cf073d87b308bfa5b1dbf96b8783cacfaff83d7ff062f
-
Filesize
364KB
MD513fc2bd4ae8d777ef3c754bd0eb8ae31
SHA10ffb7a8514546c537ab7ccacca3a2fe2ebe6942e
SHA256b576110c694958a1c4b84c30ed356a57b79ca8af756afe64c308eec1419efab1
SHA512b677500e47cf0c52f18fb2797ede8e6317c24d5040fee35d9b774ae21c236801fa446bf1a021add5ca2fed17ed56e7e0653b802bbf2c70c6157508cacaa00813
-
Filesize
364KB
MD513fc2bd4ae8d777ef3c754bd0eb8ae31
SHA10ffb7a8514546c537ab7ccacca3a2fe2ebe6942e
SHA256b576110c694958a1c4b84c30ed356a57b79ca8af756afe64c308eec1419efab1
SHA512b677500e47cf0c52f18fb2797ede8e6317c24d5040fee35d9b774ae21c236801fa446bf1a021add5ca2fed17ed56e7e0653b802bbf2c70c6157508cacaa00813
-
Filesize
173KB
MD5f41fd151a463884725de69fd00567982
SHA1e8a6db2902b025f3e8cc843ff1ec7f723520e398
SHA25690b965ecfd867cec9727a55aac34e7b7006febc36bda129608b75f057eb63e88
SHA51264ce0edac188309d9a56d4885b62aba53fdb994b11707ad378b1d2045239d3ddd71ddae8a29cea60301620c1f0748acc2007b5c02d913be5fc10a8995c419c8d
-
Filesize
173KB
MD5f41fd151a463884725de69fd00567982
SHA1e8a6db2902b025f3e8cc843ff1ec7f723520e398
SHA25690b965ecfd867cec9727a55aac34e7b7006febc36bda129608b75f057eb63e88
SHA51264ce0edac188309d9a56d4885b62aba53fdb994b11707ad378b1d2045239d3ddd71ddae8a29cea60301620c1f0748acc2007b5c02d913be5fc10a8995c419c8d