Analysis
-
max time kernel
299s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
16-04-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win11-20240412-en
General
-
Target
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
-
Size
1.2MB
-
MD5
7d57b9e5ff073b06d62cea316f77e6c8
-
SHA1
4c278f1c0ca982da691ad5cf0e0bdf35df43398e
-
SHA256
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788
-
SHA512
5d90ec0db399769d744fccba0120bc63d6b7e4e852e0b02df27def04d2e7a9a307a20d7c667de1daab6077c5c8c826f559508a60c11e5e8990da51c3f9d5e7c8
-
SSDEEP
24576:xyjZtJ0RMymoUv1LUyJXL3YXYDjduCDZZMwPs3:kjZz0ePoUvKoLSipDZZMwU
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral3/memory/3308-67-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral3/memory/3308-72-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral3/memory/3308-73-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral3/memory/3308-75-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral3/memory/4832-28-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4392 wJ0fd45.exe 3096 bL8eQ94.exe 4812 eJ0Un33.exe 4468 2xV7880.exe 804 3gR32Ml.exe 2896 4nN703ND.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" wJ0fd45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" bL8eQ94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" eJ0Un33.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4468 set thread context of 4832 4468 2xV7880.exe 77 PID 804 set thread context of 3308 804 3gR32Ml.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 1336 3308 WerFault.exe 80 -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1592 wrote to memory of 4392 1592 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 71 PID 1592 wrote to memory of 4392 1592 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 71 PID 1592 wrote to memory of 4392 1592 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 71 PID 4392 wrote to memory of 3096 4392 wJ0fd45.exe 72 PID 4392 wrote to memory of 3096 4392 wJ0fd45.exe 72 PID 4392 wrote to memory of 3096 4392 wJ0fd45.exe 72 PID 3096 wrote to memory of 4812 3096 bL8eQ94.exe 73 PID 3096 wrote to memory of 4812 3096 bL8eQ94.exe 73 PID 3096 wrote to memory of 4812 3096 bL8eQ94.exe 73 PID 4812 wrote to memory of 4468 4812 eJ0Un33.exe 74 PID 4812 wrote to memory of 4468 4812 eJ0Un33.exe 74 PID 4812 wrote to memory of 4468 4812 eJ0Un33.exe 74 PID 4468 wrote to memory of 1140 4468 2xV7880.exe 76 PID 4468 wrote to memory of 1140 4468 2xV7880.exe 76 PID 4468 wrote to memory of 1140 4468 2xV7880.exe 76 PID 4468 wrote to memory of 4832 4468 2xV7880.exe 77 PID 4468 wrote to memory of 4832 4468 2xV7880.exe 77 PID 4468 wrote to memory of 4832 4468 2xV7880.exe 77 PID 4468 wrote to memory of 4832 4468 2xV7880.exe 77 PID 4468 wrote to memory of 4832 4468 2xV7880.exe 77 PID 4468 wrote to memory of 4832 4468 2xV7880.exe 77 PID 4468 wrote to memory of 4832 4468 2xV7880.exe 77 PID 4468 wrote to memory of 4832 4468 2xV7880.exe 77 PID 4812 wrote to memory of 804 4812 eJ0Un33.exe 78 PID 4812 wrote to memory of 804 4812 eJ0Un33.exe 78 PID 4812 wrote to memory of 804 4812 eJ0Un33.exe 78 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 804 wrote to memory of 3308 804 3gR32Ml.exe 80 PID 3096 wrote to memory of 2896 3096 bL8eQ94.exe 81 PID 3096 wrote to memory of 2896 3096 bL8eQ94.exe 81 PID 3096 wrote to memory of 2896 3096 bL8eQ94.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe"C:\Users\Admin\AppData\Local\Temp\c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wJ0fd45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wJ0fd45.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bL8eQ94.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bL8eQ94.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eJ0Un33.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eJ0Un33.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xV7880.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xV7880.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3gR32Ml.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3gR32Ml.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 5687⤵
- Program crash
PID:1336
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nN703ND.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nN703ND.exe4⤵
- Executes dropped EXE
PID:2896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1020KB
MD52c277e93930fdf344061b9de61da43fd
SHA119deab510aff019844306bd8e8382764cdb31044
SHA2568e5bdce1b78f27ce3332001426b1d1f1e332f122fe11506ed12e7c1994ea6143
SHA512db960983d0b8c99b2434147e27cb433e1206a8cb4aca871f804d1eee615f569141fcbb6bad927fac53f99429c0fe5716a53aefde398312a404c604d86e77233a
-
Filesize
894KB
MD5b2e12a91c45628da38bda44827b28c85
SHA1e1c0b727d1c4f30bd7082fbd435625375e1e4726
SHA25699c587206075544ce20344ba152632324dc3474f183d572e4f3915021ff92ae0
SHA512771727e0820e143a579d3b4b0d34bb02b10818a6017a7a9cb9b52c9f597817d068a4a3e841740091d9fba0c21894a1c5e99ba9c6f53ee9098bd6a4a7ad75a888
-
Filesize
724KB
MD50e634b03cd7c3c28376c6827ba622bed
SHA1086b92b865a929f5e46e8bcb63af56ba5fdae551
SHA256d0b66e11cc4db7ddb80bdaec5c0147f9c77f418904843fb6bf26da594be2430e
SHA5129c28317a13f0edefcc586a946c464b78b21582cc155a0bb08097b8b8515a88d32c222279970440028167cea8df4fa982a90e6962372727afbe0e6ace360c93b5
-
Filesize
431KB
MD5c1569c5d9cd8d2de907c09f8e295a575
SHA115320dccccb378a900b0edb20b0305138a060e1d
SHA256ba299e3de116ce40ca647721f90927f02497e5d93a2617249dbaff6f8d30317b
SHA51207631ec9e2ffcacd4fd8a462df285e85ffe0fff79f78727cafdd663c3fc09528535887c095b3b178ef4925b845e7ee94cec20d33952d1ac185c6999f64772c92
-
Filesize
415KB
MD5394523fe5c26046b08d7bb19138a9106
SHA1fdba9cd03ae4efc39be033654b7042b471219f54
SHA256a89756fa3413156c01245e1e4b37658ea988e4836685d0d2b914351e89a68679
SHA512e70623387ca8141ee22d394df30bff370a984988a2a69270624dfee23f2d2f86f69bc4d1b0802597f8cc1ca1654dd206c394248d413c0b635947c19cb1953ac2
-
Filesize
378KB
MD55399d9e4522f87f272dc87f13d62a23c
SHA18fb9f17db86b086948cb2f17f00760fb5d29066e
SHA2563ca8e335e9aa746e8d61d35e117bd4d05b8b6d68fc0da50c7cfeacf6cd9f69b2
SHA512ac62cc79388fd01b5149c90a22b68b05c5b71fb07fdf91813b0bd18bb4688e513cc3dc5babc2779ded7e8300ca17bd1fef7c86127d6f6d768d0dbe49c661f882