Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 13:05
Static task
static1
Behavioral task
behavioral1
Sample
18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe
Resource
win10v2004-20231023-en
General
-
Target
18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe
-
Size
1.1MB
-
MD5
26a48a9ee2b814fd5f8e2e6ed4383d6b
-
SHA1
3c4537353282ab8346b1bf9baec7ae7c8a483bc5
-
SHA256
18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b
-
SHA512
ead0fb2e9fd205349e36f09bd6c9fb2d5604996fcd9dda19ce85ddc4b05478fb3a84e56d806edb82c04237aa87fb8213cb30060baff309f4be5755ac168658dc
-
SSDEEP
24576:vypN5jo7+oWXcwgPnsgV5nQUFpRC/W/m75hKn310VVLzTwuwHrAfz:6pNmbWXcwgPndxmey/K31mVXkt
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1356-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1356-24-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1356-25-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1356-27-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9Nq30PS1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9Nq30PS1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 9Nq30PS1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9Nq30PS1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9Nq30PS1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9Nq30PS1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4904-29-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
.NET Reactor proctector 19 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2144-52-0x00000000022C0000-0x00000000022E0000-memory.dmp net_reactor behavioral1/memory/2144-56-0x0000000004990000-0x00000000049AE000-memory.dmp net_reactor behavioral1/memory/2144-59-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-60-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-62-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-64-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-66-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-68-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-70-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-72-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-74-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-76-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-78-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-80-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-82-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-84-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-86-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-88-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor behavioral1/memory/2144-90-0x0000000004990000-0x00000000049A9000-memory.dmp net_reactor -
Executes dropped EXE 6 IoCs
pid Process 3940 wZ9Tg99.exe 4048 XT9CI25.exe 220 11yx9436.exe 3488 12hF607.exe 3696 13hN006.exe 2144 9Nq30PS1.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 9Nq30PS1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9Nq30PS1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" XT9CI25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" wZ9Tg99.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 220 set thread context of 1356 220 11yx9436.exe 103 PID 3488 set thread context of 4904 3488 12hF607.exe 110 PID 3696 set thread context of 2792 3696 13hN006.exe 123 -
Program crash 1 IoCs
pid pid_target Process procid_target 3380 1356 WerFault.exe 103 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2144 9Nq30PS1.exe 2144 9Nq30PS1.exe 2792 AppLaunch.exe 2792 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 9Nq30PS1.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3940 2020 18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe 88 PID 2020 wrote to memory of 3940 2020 18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe 88 PID 2020 wrote to memory of 3940 2020 18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe 88 PID 3940 wrote to memory of 4048 3940 wZ9Tg99.exe 89 PID 3940 wrote to memory of 4048 3940 wZ9Tg99.exe 89 PID 3940 wrote to memory of 4048 3940 wZ9Tg99.exe 89 PID 4048 wrote to memory of 220 4048 XT9CI25.exe 90 PID 4048 wrote to memory of 220 4048 XT9CI25.exe 90 PID 4048 wrote to memory of 220 4048 XT9CI25.exe 90 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 220 wrote to memory of 1356 220 11yx9436.exe 103 PID 4048 wrote to memory of 3488 4048 XT9CI25.exe 104 PID 4048 wrote to memory of 3488 4048 XT9CI25.exe 104 PID 4048 wrote to memory of 3488 4048 XT9CI25.exe 104 PID 3488 wrote to memory of 4904 3488 12hF607.exe 110 PID 3488 wrote to memory of 4904 3488 12hF607.exe 110 PID 3488 wrote to memory of 4904 3488 12hF607.exe 110 PID 3488 wrote to memory of 4904 3488 12hF607.exe 110 PID 3488 wrote to memory of 4904 3488 12hF607.exe 110 PID 3488 wrote to memory of 4904 3488 12hF607.exe 110 PID 3488 wrote to memory of 4904 3488 12hF607.exe 110 PID 3488 wrote to memory of 4904 3488 12hF607.exe 110 PID 3940 wrote to memory of 3696 3940 wZ9Tg99.exe 111 PID 3940 wrote to memory of 3696 3940 wZ9Tg99.exe 111 PID 3940 wrote to memory of 3696 3940 wZ9Tg99.exe 111 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 3696 wrote to memory of 2792 3696 13hN006.exe 123 PID 2020 wrote to memory of 2144 2020 18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe 124 PID 2020 wrote to memory of 2144 2020 18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe 124 PID 2020 wrote to memory of 2144 2020 18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe"C:\Users\Admin\AppData\Local\Temp\18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wZ9Tg99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wZ9Tg99.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\XT9CI25.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\XT9CI25.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11yx9436.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11yx9436.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 1926⤵
- Program crash
PID:3380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12hF607.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12hF607.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13hN006.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13hN006.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9Nq30PS1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9Nq30PS1.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1356 -ip 13561⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
887KB
MD5b6eeb5ce12a0854acf60ecb830b7b7c2
SHA1d82dab4fd29080324232279d4593d31f86372ff9
SHA256202e13aa085801258ac966416d9a82766e102620dc8fbeedf9413c57ad0d41ef
SHA5120825b62bca88aa9c591e6674c364fd889ad888aa56a05b16aed61fcb8787530895181b573b92accf1429e0c09fbd877140bf6cad7719ffa1d167ba28b9b96739
-
Filesize
887KB
MD5b6eeb5ce12a0854acf60ecb830b7b7c2
SHA1d82dab4fd29080324232279d4593d31f86372ff9
SHA256202e13aa085801258ac966416d9a82766e102620dc8fbeedf9413c57ad0d41ef
SHA5120825b62bca88aa9c591e6674c364fd889ad888aa56a05b16aed61fcb8787530895181b573b92accf1429e0c09fbd877140bf6cad7719ffa1d167ba28b9b96739
-
Filesize
717KB
MD5ce8788d432b9d9a1db37d8fe37e42c37
SHA1f8b6dbf66b63aa28db27dde831a4ad5ce979161f
SHA25611910fa612dad141154c27495d6ed4d04dff43f43cb69010e30b4027b5381a03
SHA5126db132aa28cc73e0f5cf3e2d4f144cafc9101d5b0cbf3445b3636a1e15ca863982c31d2d57630b03499e8d021d4c3bf5773839b1a37c284eb85fcd5790c56c5e
-
Filesize
717KB
MD5ce8788d432b9d9a1db37d8fe37e42c37
SHA1f8b6dbf66b63aa28db27dde831a4ad5ce979161f
SHA25611910fa612dad141154c27495d6ed4d04dff43f43cb69010e30b4027b5381a03
SHA5126db132aa28cc73e0f5cf3e2d4f144cafc9101d5b0cbf3445b3636a1e15ca863982c31d2d57630b03499e8d021d4c3bf5773839b1a37c284eb85fcd5790c56c5e
-
Filesize
425KB
MD5bef2459984ff5ec17d076f9dd9247988
SHA1ae9354158dd96bba46b8b89007bbc561fc1e719c
SHA256db5b2d51b4b843e8c825c8f326140062bf758a0e1227c906e2535688b041e851
SHA51243026d226b3004b1786bf32364c4ff1029b30e67b7adefe08c820a8d0cab9e1706354c51832d5c0a932cfdd986a5c9b6ba86cc79a3f9a9114e7a09b37f12adb4
-
Filesize
425KB
MD5bef2459984ff5ec17d076f9dd9247988
SHA1ae9354158dd96bba46b8b89007bbc561fc1e719c
SHA256db5b2d51b4b843e8c825c8f326140062bf758a0e1227c906e2535688b041e851
SHA51243026d226b3004b1786bf32364c4ff1029b30e67b7adefe08c820a8d0cab9e1706354c51832d5c0a932cfdd986a5c9b6ba86cc79a3f9a9114e7a09b37f12adb4
-
Filesize
369KB
MD5e82fb7ec66b1469695e9cb7e973d55de
SHA174d9c15ece699e912792ab87153d898db4966af4
SHA256f8cb9c6a78f61c2e47372d0882bae608f90f9a2a9414a61bc8f32ffd5ec6be8c
SHA51232293cce41a106104ad117fff064224c298bbfd048dc240b39366da616bc317f682cd9844143bff144f42e99969f9d28094119a08d6b9392e09171b1c61be5ca
-
Filesize
369KB
MD5e82fb7ec66b1469695e9cb7e973d55de
SHA174d9c15ece699e912792ab87153d898db4966af4
SHA256f8cb9c6a78f61c2e47372d0882bae608f90f9a2a9414a61bc8f32ffd5ec6be8c
SHA51232293cce41a106104ad117fff064224c298bbfd048dc240b39366da616bc317f682cd9844143bff144f42e99969f9d28094119a08d6b9392e09171b1c61be5ca
-
Filesize
408KB
MD502631e4c740048e99885e2110c95bec4
SHA1b90607f7d0d565dda74a3779fe55a6d0b9a64990
SHA256eb47d6e0f14aa0d0e99b32bf35d0ff3b19640209dcf3ddbc36797d5dade282aa
SHA51226a96b7d22e0da3c740f36ae6e7d2f671af1bca273c301c9c9e5e61b9853cfcdee4326c7788b2af950957639ffab3df7f7318b3f4276f6a49ef9ee0e0ca4595f
-
Filesize
408KB
MD502631e4c740048e99885e2110c95bec4
SHA1b90607f7d0d565dda74a3779fe55a6d0b9a64990
SHA256eb47d6e0f14aa0d0e99b32bf35d0ff3b19640209dcf3ddbc36797d5dade282aa
SHA51226a96b7d22e0da3c740f36ae6e7d2f671af1bca273c301c9c9e5e61b9853cfcdee4326c7788b2af950957639ffab3df7f7318b3f4276f6a49ef9ee0e0ca4595f