Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:16
Static task
static1
Behavioral task
behavioral1
Sample
129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe
Resource
win10v2004-20240319-en
General
-
Target
129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe
-
Size
743KB
-
MD5
0711e23d2902f70311f03cc4a658362a
-
SHA1
801d9c530001ccbb756b09976d2e53ee103deb5a
-
SHA256
129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47
-
SHA512
4c0c90d93edd2be0d8cf20e060f3751207d306b9f17d0c3986102c1884d1c9fd4e5d4b168c1f74fb3c6a4b7462a162a2c048173c8b78d073728d1747323cb65b
-
SSDEEP
12288:8Mrly90l3AxD1OdMC1kLGed/X/uuAfmVK9WOMJF5E8G6JItDuTuAVhwR7+yi:BycED1On1G3X/rAfBvC5HmWu1R7+yi
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x000700000002333b-24.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023335-33.dat family_redline behavioral1/memory/4568-34-0x00000000006C0000-0x00000000006FE000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 4876 Ox9BM04.exe 848 gN7fp67.exe 4740 1tc84Sk1.exe 4828 2lQ9351.exe 4260 3pI47ZV.exe 4568 4mJ794pk.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ox9BM04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gN7fp67.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4740 set thread context of 3672 4740 1tc84Sk1.exe 100 PID 4260 set thread context of 1588 4260 3pI47ZV.exe 106 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3672 AppLaunch.exe 3672 AppLaunch.exe 3672 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3672 AppLaunch.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2532 wrote to memory of 4876 2532 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe 94 PID 2532 wrote to memory of 4876 2532 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe 94 PID 2532 wrote to memory of 4876 2532 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe 94 PID 4876 wrote to memory of 848 4876 Ox9BM04.exe 96 PID 4876 wrote to memory of 848 4876 Ox9BM04.exe 96 PID 4876 wrote to memory of 848 4876 Ox9BM04.exe 96 PID 848 wrote to memory of 4740 848 gN7fp67.exe 97 PID 848 wrote to memory of 4740 848 gN7fp67.exe 97 PID 848 wrote to memory of 4740 848 gN7fp67.exe 97 PID 4740 wrote to memory of 3672 4740 1tc84Sk1.exe 100 PID 4740 wrote to memory of 3672 4740 1tc84Sk1.exe 100 PID 4740 wrote to memory of 3672 4740 1tc84Sk1.exe 100 PID 4740 wrote to memory of 3672 4740 1tc84Sk1.exe 100 PID 4740 wrote to memory of 3672 4740 1tc84Sk1.exe 100 PID 4740 wrote to memory of 3672 4740 1tc84Sk1.exe 100 PID 4740 wrote to memory of 3672 4740 1tc84Sk1.exe 100 PID 4740 wrote to memory of 3672 4740 1tc84Sk1.exe 100 PID 848 wrote to memory of 4828 848 gN7fp67.exe 101 PID 848 wrote to memory of 4828 848 gN7fp67.exe 101 PID 848 wrote to memory of 4828 848 gN7fp67.exe 101 PID 4876 wrote to memory of 4260 4876 Ox9BM04.exe 102 PID 4876 wrote to memory of 4260 4876 Ox9BM04.exe 102 PID 4876 wrote to memory of 4260 4876 Ox9BM04.exe 102 PID 4260 wrote to memory of 3120 4260 3pI47ZV.exe 105 PID 4260 wrote to memory of 3120 4260 3pI47ZV.exe 105 PID 4260 wrote to memory of 3120 4260 3pI47ZV.exe 105 PID 4260 wrote to memory of 1588 4260 3pI47ZV.exe 106 PID 4260 wrote to memory of 1588 4260 3pI47ZV.exe 106 PID 4260 wrote to memory of 1588 4260 3pI47ZV.exe 106 PID 4260 wrote to memory of 1588 4260 3pI47ZV.exe 106 PID 4260 wrote to memory of 1588 4260 3pI47ZV.exe 106 PID 4260 wrote to memory of 1588 4260 3pI47ZV.exe 106 PID 2532 wrote to memory of 4568 2532 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe 107 PID 2532 wrote to memory of 4568 2532 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe 107 PID 2532 wrote to memory of 4568 2532 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe"C:\Users\Admin\AppData\Local\Temp\129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ox9BM04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ox9BM04.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gN7fp67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gN7fp67.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1tc84Sk1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1tc84Sk1.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2lQ9351.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2lQ9351.exe4⤵
- Executes dropped EXE
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3pI47ZV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3pI47ZV.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3120
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:1588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4mJ794pk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4mJ794pk.exe2⤵
- Executes dropped EXE
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:81⤵PID:1556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD58905918bd7e4f4aeda3a804d81f9ee40
SHA13c488a81539116085a1c22df26085f798f7202c8
SHA2560978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA5126530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56
-
Filesize
569KB
MD52906b648aa74d9ee2158ae7a05f3c998
SHA1d22c0c06d7bba6ad9f09a357a62f6b08c3119cdc
SHA2566820089fa08404c0012d77bcd6831a6523abbf7f73c2c62f265d2252cc670654
SHA5122b4fc4b72af1fecc58ee8d6f63e9a247f4c4d381a24a028618d782c4ef27981390802838dbb7e59f789e20788dd3c3d73b2553b92783fd6bd95e987f28c67995
-
Filesize
253KB
MD53812c32bc06f844ed8903c3dd64d8e29
SHA1994ead20411563f43d192dc3cda353b85c1a2265
SHA256f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549
SHA5127a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420
-
Filesize
330KB
MD586edb7b4b9fda4ced8cc7a2e96525847
SHA10f35688f1ffe04ab1a5da7c92418e22f01ab3f55
SHA25613b4d46a5627a34c5ad2eac02c2becc7249b69ad6b7031b41eb74bee3cb249fe
SHA512c90dab3a185911b59f43141f49e667ab00609620a0c514afb25fbe7ba86b434b86899ccf6b463c5c9fac7faa2c686011985b0d4788ab6caf20776f3074a925b0
-
Filesize
233KB
MD50872390899641b50277109bbeec508e2
SHA13a0db4a7e28c71e4edec14dcd3bd9d1790e373ae
SHA256101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5
SHA51206e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9