Resubmissions
06-03-2024 14:44
240306-r37vpabh3t 1029-02-2024 14:40
240229-r1xxpsca9w 1029-02-2024 14:06
240229-rex1ksbh32 1022-09-2023 07:22
230922-h7pp8see3w 1022-09-2023 07:17
230922-h4nzjaee2t 10Analysis
-
max time kernel
113s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 14:44
Static task
static1
Behavioral task
behavioral1
Sample
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
Resource
win10v2004-20240226-en
General
-
Target
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
-
Size
1.0MB
-
MD5
8041d9fab3740fbaa0ff927a0908e073
-
SHA1
54e32969e2666415cc1c02c45ad70e3f90d7d938
-
SHA256
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a
-
SHA512
ba80f1d90cd879de0866f5cd5834b0c0122c59c41b3062b5ce30ff954d5bb5600e968fda278c0dd5343166c83a779ed4fcfd085b5149de4434398c7c97b774fa
-
SSDEEP
24576:MymXcVy4JB5oYHDPySOw7yVjwp2eok+RIWGIT6hjpX8T/JSJWe:7mXcVjXoE7yZwvokcuITEjpX8T/Jr
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/3564-28-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral1/memory/3564-29-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral1/memory/3564-30-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral1/memory/3564-32-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023222-34.dat family_redline behavioral1/files/0x0007000000023222-35.dat family_redline behavioral1/memory/3020-36-0x0000000000030000-0x0000000000060000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 4556 x9498095.exe 2680 x4203749.exe 2344 x6052541.exe 3568 g2922257.exe 3020 h4622783.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9498095.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4203749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6052541.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3568 set thread context of 3564 3568 g2922257.exe 97 -
Program crash 2 IoCs
pid pid_target Process procid_target 1732 3568 WerFault.exe 92 3788 3564 WerFault.exe 97 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1460 wrote to memory of 4556 1460 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 89 PID 1460 wrote to memory of 4556 1460 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 89 PID 1460 wrote to memory of 4556 1460 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 89 PID 4556 wrote to memory of 2680 4556 x9498095.exe 90 PID 4556 wrote to memory of 2680 4556 x9498095.exe 90 PID 4556 wrote to memory of 2680 4556 x9498095.exe 90 PID 2680 wrote to memory of 2344 2680 x4203749.exe 91 PID 2680 wrote to memory of 2344 2680 x4203749.exe 91 PID 2680 wrote to memory of 2344 2680 x4203749.exe 91 PID 2344 wrote to memory of 3568 2344 x6052541.exe 92 PID 2344 wrote to memory of 3568 2344 x6052541.exe 92 PID 2344 wrote to memory of 3568 2344 x6052541.exe 92 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 3568 wrote to memory of 3564 3568 g2922257.exe 97 PID 2344 wrote to memory of 3020 2344 x6052541.exe 103 PID 2344 wrote to memory of 3020 2344 x6052541.exe 103 PID 2344 wrote to memory of 3020 2344 x6052541.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe"C:\Users\Admin\AppData\Local\Temp\a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9498095.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9498095.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4203749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4203749.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6052541.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6052541.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2922257.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2922257.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 5407⤵
- Program crash
PID:3788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 2246⤵
- Program crash
PID:1732
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4622783.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4622783.exe5⤵
- Executes dropped EXE
PID:3020
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3568 -ip 35681⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3564 -ip 35641⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
135KB
MD593ee4ff7ec910856258aa8aa435eab64
SHA13eab52f8259f09d3d622017e38f10919047c9cdc
SHA256e5d76b40a342f84c39d69fd9fd99235baf81fcdab701071d9302182504b61003
SHA512de0ee6dfe1011bdb080d0d5204b0264f429d9bef23c98af5bb8a85a956dbfb44fa58505fe178c88929377b2c6e3e1026af7911a182f2ad062e0a7ee39fe1781b
-
Filesize
174KB
MD5a7b12e6ecaa1865a65f29520ec8ad8e2
SHA171fd6f2503333c2da0a59011742e52505f38f4d3
SHA25605afa926862cb7d9fd4225886f732ff1df7a0b8cde0f1f22a3a095a90b5dcf85
SHA5123fc96f16e2a201889ac35dba9ff21cd5ef12cd31b271a7e239b64d4d551686e1987e2a4b63ebdcfe2708d80d5b7c277c162b23960f52f572e8057cc795dc8e68