Analysis
-
max time kernel
149s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe
Resource
win10v2004-20230915-en
General
-
Target
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe
-
Size
2.5MB
-
MD5
1f664d1699b3dcf5bb3accc6566833e4
-
SHA1
a8ee465ce7702482e2e63d3ba06306ea80f2be25
-
SHA256
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7
-
SHA512
bb970ae19fb933706e18fc71ebe8ee2c1b29033e83558ba752c3e763be7aaca89bfdf981b4c881bbf2267809faa32b068a22422fb6371233b65176b33a8366a2
-
SSDEEP
49152:VLMtyQ3eJziMp6a3vr78NlQx2F+VTZXC:VLMtLMQC8h+V
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detect Mystic stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x000800000002307c-16.dat family_mystic behavioral2/files/0x000800000002307c-17.dat family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2856 y2657058.exe 3152 m8922010.exe 4036 n5792348.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2657058.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4680 set thread context of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 4680 wrote to memory of 2424 4680 1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe 87 PID 2424 wrote to memory of 2856 2424 AppLaunch.exe 88 PID 2424 wrote to memory of 2856 2424 AppLaunch.exe 88 PID 2424 wrote to memory of 2856 2424 AppLaunch.exe 88 PID 2856 wrote to memory of 3152 2856 y2657058.exe 89 PID 2856 wrote to memory of 3152 2856 y2657058.exe 89 PID 2856 wrote to memory of 3152 2856 y2657058.exe 89 PID 2856 wrote to memory of 4036 2856 y2657058.exe 91 PID 2856 wrote to memory of 4036 2856 y2657058.exe 91 PID 2856 wrote to memory of 4036 2856 y2657058.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe"C:\Users\Admin\AppData\Local\Temp\1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2657058.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2657058.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m8922010.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m8922010.exe4⤵
- Executes dropped EXE
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n5792348.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n5792348.exe4⤵
- Executes dropped EXE
PID:4036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD575af76b345832cb3fdd95176f320966a
SHA148f2c3b641b5da62b1dbbd5990e1a5b8f679a5db
SHA256847578f24ec972efd962a2a79c66a093bb8bd13e9d55cf7d1b5cdc11d698a318
SHA5127d1a2c9833252000638ec41f87355f3d520e09f7cbe17011fa861ca6a3331179e92ed454111bf6ebe8c9a0086236c601c8d213da96e475d4983eb85f78a9ae52
-
Filesize
271KB
MD575af76b345832cb3fdd95176f320966a
SHA148f2c3b641b5da62b1dbbd5990e1a5b8f679a5db
SHA256847578f24ec972efd962a2a79c66a093bb8bd13e9d55cf7d1b5cdc11d698a318
SHA5127d1a2c9833252000638ec41f87355f3d520e09f7cbe17011fa861ca6a3331179e92ed454111bf6ebe8c9a0086236c601c8d213da96e475d4983eb85f78a9ae52
-
Filesize
140KB
MD5fdaf573098aeb5e81aa13fc4123592d4
SHA1813c0de2e9a7f6179fc59b3cfd22ef92411cdb2d
SHA25609c7e44a353df54bcbc739ecb92b95df506ce0c5d11fa5bb5917759fe16b0ce9
SHA512874eb9706ace1d17f80e17657da9aeadbe28b6bac9571dafb5dd4a634414030172159be4cd550bc56a4ef5fa5c8e0cc0b70df07e109ca0d63bc15c7a8fb39dcc
-
Filesize
140KB
MD5fdaf573098aeb5e81aa13fc4123592d4
SHA1813c0de2e9a7f6179fc59b3cfd22ef92411cdb2d
SHA25609c7e44a353df54bcbc739ecb92b95df506ce0c5d11fa5bb5917759fe16b0ce9
SHA512874eb9706ace1d17f80e17657da9aeadbe28b6bac9571dafb5dd4a634414030172159be4cd550bc56a4ef5fa5c8e0cc0b70df07e109ca0d63bc15c7a8fb39dcc
-
Filesize
174KB
MD59a9968a39064de03ba78d203a2419970
SHA15a17ba05f391af5d63070a74e9767d11aab5ceb4
SHA2567c5fa320ed9cd34224aec04a0a691ee884f6c8ecf211a987a91e862adffc12a2
SHA512db7fcb14d9e66e6582fe0dc0f85bd7ea3947c03930766bc7cc4f3d97b461f3656f9ad8faa1154ac039395b48dc126941c9ce281df9d37cf6b70b77b25a205bad
-
Filesize
174KB
MD59a9968a39064de03ba78d203a2419970
SHA15a17ba05f391af5d63070a74e9767d11aab5ceb4
SHA2567c5fa320ed9cd34224aec04a0a691ee884f6c8ecf211a987a91e862adffc12a2
SHA512db7fcb14d9e66e6582fe0dc0f85bd7ea3947c03930766bc7cc4f3d97b461f3656f9ad8faa1154ac039395b48dc126941c9ce281df9d37cf6b70b77b25a205bad