Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe
Resource
win10v2004-20230915-en
General
-
Target
6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe
-
Size
935KB
-
MD5
3b090310d7146005221ad9d254f65fa6
-
SHA1
4bfe867372893b1e4171828845980829154b1267
-
SHA256
6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f
-
SHA512
36679deb21cede51a6b0504a71efc9a4b7c4586477d5f4a45c32e77e3e3dbb2dd7463c2d671ca90d1cab357dffd841daf07865d24b3b2ec359441955adf7bb20
-
SSDEEP
12288:QMrSy90eoBQlfP1eFLsQQb0qSrSwZnjOfon4sXtT7WyqxsXWjM7cDt4ktQ:Sypsgb07rSUjOf+fXUyqrjM7cDtDm
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4296-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4296-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4296-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4296-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 2384 x6732039.exe 1184 x4306016.exe 3524 x1781948.exe 3480 g6988865.exe 4448 h7982950.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6732039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4306016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1781948.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3480 set thread context of 4296 3480 g6988865.exe 91 -
Program crash 2 IoCs
pid pid_target Process procid_target 3384 4296 WerFault.exe 91 4644 3480 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2384 2472 6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe 86 PID 2472 wrote to memory of 2384 2472 6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe 86 PID 2472 wrote to memory of 2384 2472 6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe 86 PID 2384 wrote to memory of 1184 2384 x6732039.exe 87 PID 2384 wrote to memory of 1184 2384 x6732039.exe 87 PID 2384 wrote to memory of 1184 2384 x6732039.exe 87 PID 1184 wrote to memory of 3524 1184 x4306016.exe 88 PID 1184 wrote to memory of 3524 1184 x4306016.exe 88 PID 1184 wrote to memory of 3524 1184 x4306016.exe 88 PID 3524 wrote to memory of 3480 3524 x1781948.exe 89 PID 3524 wrote to memory of 3480 3524 x1781948.exe 89 PID 3524 wrote to memory of 3480 3524 x1781948.exe 89 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3480 wrote to memory of 4296 3480 g6988865.exe 91 PID 3524 wrote to memory of 4448 3524 x1781948.exe 101 PID 3524 wrote to memory of 4448 3524 x1781948.exe 101 PID 3524 wrote to memory of 4448 3524 x1781948.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe"C:\Users\Admin\AppData\Local\Temp\6783d80655289133bcf07e9bb79e6e9ab30ab69718c3f7bbbdc9a5cee3cc065f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6732039.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6732039.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4306016.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4306016.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1781948.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1781948.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6988865.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6988865.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 5407⤵
- Program crash
PID:3384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 5726⤵
- Program crash
PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7982950.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7982950.exe5⤵
- Executes dropped EXE
PID:4448
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3480 -ip 34801⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4296 -ip 42961⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
833KB
MD53b82e546b8f52bc27a45de5c2fac8710
SHA16d354f95bbb40819a501dde2d26444eb3e9256f7
SHA256d09cb09e54d4b5c6e01e8079c30ce6a2bea8e25951dbf0cc89e5347b8912b8af
SHA5129be6100b391f96bd43bd87c1b76d75dc9af1ff48b987496b3f429d19993a5d0f5fa4f97f1f8f6cf9078fa9d8e829c08b8dbfbfe3a99e3409719c6256acbdcafe
-
Filesize
833KB
MD53b82e546b8f52bc27a45de5c2fac8710
SHA16d354f95bbb40819a501dde2d26444eb3e9256f7
SHA256d09cb09e54d4b5c6e01e8079c30ce6a2bea8e25951dbf0cc89e5347b8912b8af
SHA5129be6100b391f96bd43bd87c1b76d75dc9af1ff48b987496b3f429d19993a5d0f5fa4f97f1f8f6cf9078fa9d8e829c08b8dbfbfe3a99e3409719c6256acbdcafe
-
Filesize
559KB
MD58001619f178b606273a784d77a6cfdbb
SHA17dcf79968e844d77af8aa0c053aa76a1c56f16ed
SHA25661beda55f3053e14177051819ff5246e1960b44fc9a45d743e648e1086d9a8cf
SHA5121b4a0fe4ca3292d166912374103bf6e1a8539d2a37ce30f6386c23ec0b765d6afb91c7587b11bafd581b9aa3dc576de0cc48825c9394b4b6c2b80f01f4323836
-
Filesize
559KB
MD58001619f178b606273a784d77a6cfdbb
SHA17dcf79968e844d77af8aa0c053aa76a1c56f16ed
SHA25661beda55f3053e14177051819ff5246e1960b44fc9a45d743e648e1086d9a8cf
SHA5121b4a0fe4ca3292d166912374103bf6e1a8539d2a37ce30f6386c23ec0b765d6afb91c7587b11bafd581b9aa3dc576de0cc48825c9394b4b6c2b80f01f4323836
-
Filesize
393KB
MD5f1760c63be45366399f3e362644900d2
SHA12176b66ab48b5c6991783c0691d9d19b9abd29ee
SHA2564feab7bdaf8eded6076a41839771702db23bd72a5d76f4caafb371c4e27b982b
SHA512398e80a1f770f8c37f0ef4beeddb254b7724776b0c19b5eb4e0ddc32dccd82ad1a2f039d229400cc255ef5628c24762b5fd7ae090479b4cc19f9e19b5a4d6920
-
Filesize
393KB
MD5f1760c63be45366399f3e362644900d2
SHA12176b66ab48b5c6991783c0691d9d19b9abd29ee
SHA2564feab7bdaf8eded6076a41839771702db23bd72a5d76f4caafb371c4e27b982b
SHA512398e80a1f770f8c37f0ef4beeddb254b7724776b0c19b5eb4e0ddc32dccd82ad1a2f039d229400cc255ef5628c24762b5fd7ae090479b4cc19f9e19b5a4d6920
-
Filesize
380KB
MD58a7a8c48210b648337ce5e3e50a93247
SHA1e374fcece4b1d531e2a93d85d514d4ab3db72cbb
SHA2567d79a1df738e4cbfb2579a0641a2dd0221c064851e444cd941507b3d19d92d9d
SHA5120733daed7629ce0803f2d3d9e6f166f512d9866cce4d6eac9bda9d0119244ccc2b79481c76a82edfb6879b8b563f1a44b294b5a7b2d387357907dc89a0869332
-
Filesize
380KB
MD58a7a8c48210b648337ce5e3e50a93247
SHA1e374fcece4b1d531e2a93d85d514d4ab3db72cbb
SHA2567d79a1df738e4cbfb2579a0641a2dd0221c064851e444cd941507b3d19d92d9d
SHA5120733daed7629ce0803f2d3d9e6f166f512d9866cce4d6eac9bda9d0119244ccc2b79481c76a82edfb6879b8b563f1a44b294b5a7b2d387357907dc89a0869332
-
Filesize
173KB
MD5366c37e7e9b43ea15f361ba6cce5ac8b
SHA13ceff4e393cd8f0aaa514ccede3791d566e71d90
SHA256f93fdd68dc4a19c89512a6ed6f4b35a12ea4685152bd1e2de76b7b7ce08fdfb9
SHA5128729ac8e8814b5e42c260500cab185a32fa2034b80ce34372b2485a23b03fc7fd1a69ad29b8c23ddd56dc5378380fe09d5627272ab05b5b19a98df4863b57ad6
-
Filesize
173KB
MD5366c37e7e9b43ea15f361ba6cce5ac8b
SHA13ceff4e393cd8f0aaa514ccede3791d566e71d90
SHA256f93fdd68dc4a19c89512a6ed6f4b35a12ea4685152bd1e2de76b7b7ce08fdfb9
SHA5128729ac8e8814b5e42c260500cab185a32fa2034b80ce34372b2485a23b03fc7fd1a69ad29b8c23ddd56dc5378380fe09d5627272ab05b5b19a98df4863b57ad6