Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe
Resource
win10v2004-20230915-en
General
-
Target
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe
-
Size
924KB
-
MD5
5517f73ecd24fa9d53627b8ce7c4cecc
-
SHA1
13ed6802d17741dfc57478402b8c3196b8b7aedc
-
SHA256
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b
-
SHA512
81115f58bd93fa545162c14cc6a8ed13928dfed5a1a54fc30818dadc105e58a1fe8de68d29dcfdc1bb29d523e03732010b3d9a717abd570210a5f0a7d230a5ed
-
SSDEEP
24576:AyGSlOJbe3w7XrzNM1Q+K1NaU4K9o2Pc65GoksrZonbf:HIJbwwrrzNS8t44Pc65Go6b
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1604-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1604-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1604-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1604-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 3908 x3743348.exe 1628 x9760250.exe 2168 x1374639.exe 3448 g5407336.exe 4236 h2786093.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3743348.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9760250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1374639.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3448 set thread context of 1604 3448 g5407336.exe 89 -
Program crash 2 IoCs
pid pid_target Process procid_target 4232 3448 WerFault.exe 88 2112 1604 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3908 3984 1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe 85 PID 3984 wrote to memory of 3908 3984 1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe 85 PID 3984 wrote to memory of 3908 3984 1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe 85 PID 3908 wrote to memory of 1628 3908 x3743348.exe 86 PID 3908 wrote to memory of 1628 3908 x3743348.exe 86 PID 3908 wrote to memory of 1628 3908 x3743348.exe 86 PID 1628 wrote to memory of 2168 1628 x9760250.exe 87 PID 1628 wrote to memory of 2168 1628 x9760250.exe 87 PID 1628 wrote to memory of 2168 1628 x9760250.exe 87 PID 2168 wrote to memory of 3448 2168 x1374639.exe 88 PID 2168 wrote to memory of 3448 2168 x1374639.exe 88 PID 2168 wrote to memory of 3448 2168 x1374639.exe 88 PID 3448 wrote to memory of 2548 3448 g5407336.exe 91 PID 3448 wrote to memory of 2548 3448 g5407336.exe 91 PID 3448 wrote to memory of 2548 3448 g5407336.exe 91 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 3448 wrote to memory of 1604 3448 g5407336.exe 89 PID 2168 wrote to memory of 4236 2168 x1374639.exe 101 PID 2168 wrote to memory of 4236 2168 x1374639.exe 101 PID 2168 wrote to memory of 4236 2168 x1374639.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe"C:\Users\Admin\AppData\Local\Temp\1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3743348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3743348.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9760250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9760250.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1374639.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1374639.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5407336.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5407336.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 5407⤵
- Program crash
PID:2112
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 5726⤵
- Program crash
PID:4232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2786093.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2786093.exe5⤵
- Executes dropped EXE
PID:4236
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1604 -ip 16041⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3448 -ip 34481⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5a2bdeb9008519afbdd8ef590c8ff261c
SHA1096d27ca47420909d8388c3cb69a422692de445d
SHA256cc5b9aed0dcc11f400ac4c6e0a78e082c9f6c8742c9a8f1a18adff4d2e790d53
SHA512f86d1b569e1149fb457dac399e821dc5460fdf4b234246d8c35915f80ae19a3212be1023f1138b12168e3ea08d81996c79bdc837b65b2ae5782b782812eab41b
-
Filesize
827KB
MD5a2bdeb9008519afbdd8ef590c8ff261c
SHA1096d27ca47420909d8388c3cb69a422692de445d
SHA256cc5b9aed0dcc11f400ac4c6e0a78e082c9f6c8742c9a8f1a18adff4d2e790d53
SHA512f86d1b569e1149fb457dac399e821dc5460fdf4b234246d8c35915f80ae19a3212be1023f1138b12168e3ea08d81996c79bdc837b65b2ae5782b782812eab41b
-
Filesize
555KB
MD575f3579044ec13544b03ad8b204f3af3
SHA164333eb93e3c0332227356287756552da3874569
SHA256f2b5c42eb80eb6ec5accfccc42d2bfc95cc4811360eca054b6bb20e1f9cbcca0
SHA512912fca14e2b6f598e6a0aacffd9fb36d2e3ff6ca770766281a3c9659ca45e9b3044d15b0ec704049b2235f414f3a3172fe0d37b311889bdd054627077fe97891
-
Filesize
555KB
MD575f3579044ec13544b03ad8b204f3af3
SHA164333eb93e3c0332227356287756552da3874569
SHA256f2b5c42eb80eb6ec5accfccc42d2bfc95cc4811360eca054b6bb20e1f9cbcca0
SHA512912fca14e2b6f598e6a0aacffd9fb36d2e3ff6ca770766281a3c9659ca45e9b3044d15b0ec704049b2235f414f3a3172fe0d37b311889bdd054627077fe97891
-
Filesize
390KB
MD5022337ca94067630c0f67e23c6ae2fdb
SHA1bd52b40bff15bed89742a7e7b2fba77fbce50a54
SHA25630c50fef936eeee49bfb7a2d57a9a8796e3749dc7a5fabd9a31e99915f4507aa
SHA512813bc92270895128cd5fefea9e122f70b4a58f253698f270a67785f29c2e50d0236d0a8637bfc2232cf7c82551db1b4719e919d14647ad0b18ea69e8dbf17b5a
-
Filesize
390KB
MD5022337ca94067630c0f67e23c6ae2fdb
SHA1bd52b40bff15bed89742a7e7b2fba77fbce50a54
SHA25630c50fef936eeee49bfb7a2d57a9a8796e3749dc7a5fabd9a31e99915f4507aa
SHA512813bc92270895128cd5fefea9e122f70b4a58f253698f270a67785f29c2e50d0236d0a8637bfc2232cf7c82551db1b4719e919d14647ad0b18ea69e8dbf17b5a
-
Filesize
364KB
MD52618cdb520871e2bd82c120e6491f5f9
SHA148fbc382db7e4fddb9be520d586911c5df3d62df
SHA2566d87e18a4e0cf9876af771dafa500351b081beeb5fea9417a00328f9f859a022
SHA5122d1f0994af72f3639dd04a1e2361b79d1a628a6eba8e9c9a662bb5c57ac518ecbf97c681ac5a526a6c30bb9d0a9a6a58338f3d1150942ca26401519d75e74702
-
Filesize
364KB
MD52618cdb520871e2bd82c120e6491f5f9
SHA148fbc382db7e4fddb9be520d586911c5df3d62df
SHA2566d87e18a4e0cf9876af771dafa500351b081beeb5fea9417a00328f9f859a022
SHA5122d1f0994af72f3639dd04a1e2361b79d1a628a6eba8e9c9a662bb5c57ac518ecbf97c681ac5a526a6c30bb9d0a9a6a58338f3d1150942ca26401519d75e74702
-
Filesize
173KB
MD52e90e143b5830eae4be93bbb189cf63c
SHA194fe02c63867a1219bde71fe9faaa7521644d0c6
SHA256a0f533e4996e9b1b4a8eaa0bfd66b9475a7ac7bd3081121daa751742e7fbcd1a
SHA51249f1de0749f8a98810644dc183852062f78bf5403e3fd168b2847da0786822e8fc40dbcf4b319e4d7c4b7c4e4ca9a5514defe5cf935641410993c5f9fb614489
-
Filesize
173KB
MD52e90e143b5830eae4be93bbb189cf63c
SHA194fe02c63867a1219bde71fe9faaa7521644d0c6
SHA256a0f533e4996e9b1b4a8eaa0bfd66b9475a7ac7bd3081121daa751742e7fbcd1a
SHA51249f1de0749f8a98810644dc183852062f78bf5403e3fd168b2847da0786822e8fc40dbcf4b319e4d7c4b7c4e4ca9a5514defe5cf935641410993c5f9fb614489