Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe
Resource
win10v2004-20240226-en
General
-
Target
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe
-
Size
1.0MB
-
MD5
0fc9cee6808909feddf5c8e4e30c7abb
-
SHA1
e7498be8807c91714ebcd30d698e3ea0670ef6cb
-
SHA256
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4
-
SHA512
80eb9a7ec6826b949b76d5e24200418647e86fecf6144900e900983f50c6502fc32fc1d90b577e27dab7ed2f2e6625ec6326f690c4ab17905ac46b2469b46353
-
SSDEEP
24576:8ygbPFjq6/rtm4RLWdXuFFFymJ5throrhUniYRHA:rgbPRq6ztxS0b/vrDnBR
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2hu6349.exe mystic_family -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4zE285zL.exe family_redline behavioral1/memory/2216-50-0x0000000000B70000-0x0000000000BAE000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 8 IoCs
Processes:
aQ5NH25.exent1lc13.exeqF3Mu50.exeIV5Fa29.exe1qM97ry4.exe2hu6349.exe3EN55Ke.exe4zE285zL.exepid process 3248 aQ5NH25.exe 4052 nt1lc13.exe 996 qF3Mu50.exe 2952 IV5Fa29.exe 2108 1qM97ry4.exe 1412 2hu6349.exe 736 3EN55Ke.exe 2216 4zE285zL.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exeaQ5NH25.exent1lc13.exeqF3Mu50.exeIV5Fa29.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" aQ5NH25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nt1lc13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" qF3Mu50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" IV5Fa29.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1qM97ry4.exe3EN55Ke.exedescription pid process target process PID 2108 set thread context of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 736 set thread context of 836 736 3EN55Ke.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exeAppLaunch.exepid process 4568 AppLaunch.exe 4568 AppLaunch.exe 836 AppLaunch.exe 836 AppLaunch.exe 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 3560 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
AppLaunch.exepid process 836 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4568 AppLaunch.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3560 -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exeaQ5NH25.exent1lc13.exeqF3Mu50.exeIV5Fa29.exe1qM97ry4.exe3EN55Ke.exedescription pid process target process PID 4932 wrote to memory of 3248 4932 6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe aQ5NH25.exe PID 4932 wrote to memory of 3248 4932 6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe aQ5NH25.exe PID 4932 wrote to memory of 3248 4932 6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe aQ5NH25.exe PID 3248 wrote to memory of 4052 3248 aQ5NH25.exe nt1lc13.exe PID 3248 wrote to memory of 4052 3248 aQ5NH25.exe nt1lc13.exe PID 3248 wrote to memory of 4052 3248 aQ5NH25.exe nt1lc13.exe PID 4052 wrote to memory of 996 4052 nt1lc13.exe qF3Mu50.exe PID 4052 wrote to memory of 996 4052 nt1lc13.exe qF3Mu50.exe PID 4052 wrote to memory of 996 4052 nt1lc13.exe qF3Mu50.exe PID 996 wrote to memory of 2952 996 qF3Mu50.exe IV5Fa29.exe PID 996 wrote to memory of 2952 996 qF3Mu50.exe IV5Fa29.exe PID 996 wrote to memory of 2952 996 qF3Mu50.exe IV5Fa29.exe PID 2952 wrote to memory of 2108 2952 IV5Fa29.exe 1qM97ry4.exe PID 2952 wrote to memory of 2108 2952 IV5Fa29.exe 1qM97ry4.exe PID 2952 wrote to memory of 2108 2952 IV5Fa29.exe 1qM97ry4.exe PID 2108 wrote to memory of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 2108 wrote to memory of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 2108 wrote to memory of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 2108 wrote to memory of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 2108 wrote to memory of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 2108 wrote to memory of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 2108 wrote to memory of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 2108 wrote to memory of 4568 2108 1qM97ry4.exe AppLaunch.exe PID 2952 wrote to memory of 1412 2952 IV5Fa29.exe 2hu6349.exe PID 2952 wrote to memory of 1412 2952 IV5Fa29.exe 2hu6349.exe PID 2952 wrote to memory of 1412 2952 IV5Fa29.exe 2hu6349.exe PID 996 wrote to memory of 736 996 qF3Mu50.exe 3EN55Ke.exe PID 996 wrote to memory of 736 996 qF3Mu50.exe 3EN55Ke.exe PID 996 wrote to memory of 736 996 qF3Mu50.exe 3EN55Ke.exe PID 736 wrote to memory of 836 736 3EN55Ke.exe AppLaunch.exe PID 736 wrote to memory of 836 736 3EN55Ke.exe AppLaunch.exe PID 736 wrote to memory of 836 736 3EN55Ke.exe AppLaunch.exe PID 736 wrote to memory of 836 736 3EN55Ke.exe AppLaunch.exe PID 736 wrote to memory of 836 736 3EN55Ke.exe AppLaunch.exe PID 736 wrote to memory of 836 736 3EN55Ke.exe AppLaunch.exe PID 4052 wrote to memory of 2216 4052 nt1lc13.exe 4zE285zL.exe PID 4052 wrote to memory of 2216 4052 nt1lc13.exe 4zE285zL.exe PID 4052 wrote to memory of 2216 4052 nt1lc13.exe 4zE285zL.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe"C:\Users\Admin\AppData\Local\Temp\6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aQ5NH25.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aQ5NH25.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nt1lc13.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nt1lc13.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qF3Mu50.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qF3Mu50.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\IV5Fa29.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\IV5Fa29.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qM97ry4.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qM97ry4.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2hu6349.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2hu6349.exe6⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3EN55Ke.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3EN55Ke.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:836 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4zE285zL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4zE285zL.exe4⤵
- Executes dropped EXE
PID:2216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD52cc85dd4f728ce87d0f5723d459fd17f
SHA1484aedca9137ccef3838383ca308629cd2fcf9a6
SHA25679e6dd8ee635ee95d81a3f0f289ae8e75e2d417d0d8ff85f50c3b1058d605aa6
SHA512a37793ac4e82117e03607311f6d80853d90a29b17d62080a901a657268f33972655205aeddfba7e227c34916732fd0f30fda7013a7b2bb61d637ceed7f0a2e55
-
Filesize
710KB
MD5d6fb442be655ebe25f52850771524172
SHA108e6d32d083d719953a2b07d2deff2ec432bb322
SHA256a45229a356054f0d595beda5634c836b6c0813c562341bd291cfd0862117df07
SHA5125e316b7dcc18fe97b029e805fb977e82ac67a167eff4a4080342c6816b076ff760406f21a7c178e5381577c4d608f1b6d02df06d5178392c7b4951d0fa9c13f8
-
Filesize
221KB
MD58905918bd7e4f4aeda3a804d81f9ee40
SHA13c488a81539116085a1c22df26085f798f7202c8
SHA2560978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA5126530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56
-
Filesize
537KB
MD557cfb268bff8784c4098361a58553696
SHA1260fdcdd2c756529bf5f5159b87ad1410d3f76be
SHA256df77973133846bdecd6daca69853cdf890db6890be2633be0e52cb38dca8e910
SHA51287779243903c04226e76032c13269ab97a07652577396817e498b13ab2fb09450a223ae52c08f96aafab188c8c39711201b4ef80ce5f66b5505ba2fa63d41a1a
-
Filesize
252KB
MD5a7908efdecfe884c4c2a753ad4e5ec64
SHA1fb189c221b95d95bbcae4a8e15cc54ed0872f7a6
SHA25645389dd795ef2f76f17896fea9cf5100dfd699d907c70de5ec8203843895aff8
SHA51256ada87f4952ef939998a07ad56c99c9ae40db1cfb505ad4c423d3b78c0a48e5e7ff263991b7e0790d7bef7f16447e78689880636e919095895112cfd73fa243
-
Filesize
300KB
MD58fe52ca03eba6c9f7071e7b0130947db
SHA102367c857e0c0be66f3011204402d617d8ffd6bc
SHA2569fd9e03a4ebaed2e4599e49018be3d31ebf24f80bfb5cc232a768b6ae0c9579e
SHA512c6e9f27c3d5cf315dbeb4b12ea0d12c21ca372d1ae0efe5af5f9ebf10a9f16974565caaf22b986dc01b385c930102f9ffec2bf548d58ff25517bec72d77a0c97
-
Filesize
154KB
MD5098478afedb77e3ad162dcb60ba1079e
SHA1aae5fd48aaf7d271c23130197dcfdd8791307d6f
SHA2569ec13c3b726ec3ca9cf66364b6db9f252c3eaaf124b53d032564aec8e9ee8541
SHA512145ab134ea391792a91c746b865ac48f2cafc8cec71664b6ca7b8cfc28fe508a953a095bb26f6a69d2066b8489ce02c7b0e82eae6ae5adc0e6b03435de86b14f
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9