Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe
Resource
win10v2004-20230915-en
General
-
Target
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe
-
Size
742KB
-
MD5
2670dec8c84136ccffc4f5845cff9918
-
SHA1
ad5bfdf880baeec86339601e4213b151b74e01ba
-
SHA256
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15
-
SHA512
ab3eea0f50709c8f1eba115b574df1db5f8187c736de4d46ac7679e73e8b90d12d883658002a2a9a2dba3abc79b55a78933e36999bb6a49b9178fa4b446f8ede
-
SSDEEP
12288:Ox//yfYb5BIQZVtrdMLIMqn28nJ/w8tPz3WIBdNSj83QZZWq/3K9:KiuBtZWLI1nFJ/tF7EA3sZWqv+
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detect Mystic stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231e0-16.dat family_mystic behavioral2/files/0x00070000000231e0-17.dat family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3148 y3408536.exe 4560 m6468841.exe 4464 n5174240.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3408536.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3692 set thread context of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3692 wrote to memory of 1564 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 88 PID 3692 wrote to memory of 1564 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 88 PID 3692 wrote to memory of 1564 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 88 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 3692 wrote to memory of 4876 3692 94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe 89 PID 4876 wrote to memory of 3148 4876 AppLaunch.exe 90 PID 4876 wrote to memory of 3148 4876 AppLaunch.exe 90 PID 4876 wrote to memory of 3148 4876 AppLaunch.exe 90 PID 3148 wrote to memory of 4560 3148 y3408536.exe 92 PID 3148 wrote to memory of 4560 3148 y3408536.exe 92 PID 3148 wrote to memory of 4560 3148 y3408536.exe 92 PID 3148 wrote to memory of 4464 3148 y3408536.exe 93 PID 3148 wrote to memory of 4464 3148 y3408536.exe 93 PID 3148 wrote to memory of 4464 3148 y3408536.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe"C:\Users\Admin\AppData\Local\Temp\94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3408536.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3408536.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6468841.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6468841.exe4⤵
- Executes dropped EXE
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n5174240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n5174240.exe4⤵
- Executes dropped EXE
PID:4464
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD58edceca30cb10f91cee40b6a70424e80
SHA1ffa43f1251d65da90f2aa775aeef2cae04449368
SHA2569499d956979017b7262dc2feae45c0b8b71ac54b18de2f9d9a200e6206df5e8a
SHA512157de28d1b52c1df60241a589a9a2e4d188a7581af5b036dbd9f50a054b5e54788789f8fa25a8a64cd47521cb36e8e2a7f8ec6a49735828911e4550f52dc61cb
-
Filesize
271KB
MD58edceca30cb10f91cee40b6a70424e80
SHA1ffa43f1251d65da90f2aa775aeef2cae04449368
SHA2569499d956979017b7262dc2feae45c0b8b71ac54b18de2f9d9a200e6206df5e8a
SHA512157de28d1b52c1df60241a589a9a2e4d188a7581af5b036dbd9f50a054b5e54788789f8fa25a8a64cd47521cb36e8e2a7f8ec6a49735828911e4550f52dc61cb
-
Filesize
140KB
MD537a8fe91a97224ec39eb2bfa61087446
SHA1b12b70b16f519709cb158929215df4a10d641aab
SHA256281b522474a4c8e79ade682d6964117e62bae0f30f4ee373059396ba21fca488
SHA512a2fab083da6939018aac8eb45b35a8fc241e98ae6baa4a5ff8b1908fad7f54695feba5426c5dc74eefc0a5877201b844128b6bb63c617c16518d818167396b1f
-
Filesize
140KB
MD537a8fe91a97224ec39eb2bfa61087446
SHA1b12b70b16f519709cb158929215df4a10d641aab
SHA256281b522474a4c8e79ade682d6964117e62bae0f30f4ee373059396ba21fca488
SHA512a2fab083da6939018aac8eb45b35a8fc241e98ae6baa4a5ff8b1908fad7f54695feba5426c5dc74eefc0a5877201b844128b6bb63c617c16518d818167396b1f
-
Filesize
174KB
MD53f1308b0da1b3bf6a3778992e8fc6bec
SHA1dc6a4b3e8f6bcef60acb562f5ea613d597b71dcc
SHA25648e9613f6ba2624ba7840f2e9fd23478f92d973c915d2153f46cb391aa2df153
SHA5121ef51c21475d3238d9768d369ae5a23f7d66a871af1ca333f47160a76d4245caa8dd99a02932687f565c3f222bdc5f2a8557b487945aeb01f0c67b50c893c60d
-
Filesize
174KB
MD53f1308b0da1b3bf6a3778992e8fc6bec
SHA1dc6a4b3e8f6bcef60acb562f5ea613d597b71dcc
SHA25648e9613f6ba2624ba7840f2e9fd23478f92d973c915d2153f46cb391aa2df153
SHA5121ef51c21475d3238d9768d369ae5a23f7d66a871af1ca333f47160a76d4245caa8dd99a02932687f565c3f222bdc5f2a8557b487945aeb01f0c67b50c893c60d