Overview
overview
10Static
static
301f1d397ee...7e.exe
windows10-2004-x64
10061d4b3cae...c3.exe
windows10-2004-x64
101510cb1a4f...7d.exe
windows10-2004-x64
1018c958ac25...40.exe
windows10-2004-x64
101ae5f47f1c...e8.exe
windows10-2004-x64
1027768bc448...de.exe
windows10-2004-x64
1032de0993bc...1e.exe
windows10-2004-x64
104758300458...ca.exe
windows10-2004-x64
1058fadac014...99.exe
windows10-2004-x64
105bcb59af1e...c1.exe
windows10-2004-x64
106e55f3939c...05.exe
windows10-2004-x64
107974488bc6...15.exe
windows10-2004-x64
10835316bac6...9f.exe
windows10-2004-x64
109e24511e4a...1c.exe
windows10-2004-x64
10a9634fd1ba...2f.exe
windows10-2004-x64
10c1f424012a...97.exe
windows10-2004-x64
10d73983a055...6c.exe
windows10-2004-x64
10d7acd7c73c...c4.exe
windows10-2004-x64
10e7a1c6bd3a...74.exe
windows10-2004-x64
10e9a8b4bb4d...42.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
01f1d397eef76f3dd4c0d5121d6596a6ff410ea7e8fe3ebd913d701f9928557e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
061d4b3cae1ba072bfa6849a31d62afd811d04b5a2eabddc17081e56f1701cc3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1510cb1a4ff1f8027f8f81a2905978b60e40fed8901c2f4c5e99e35801083d7d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
18c958ac2546c1661c9e22160d98271416eb758de547c310b4383874d4384f40.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
1ae5f47f1c4c38ae30421b7b2d3551cc7678aa01afe0501ade7019fa35f63be8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
27768bc4484847752b8e6b935f4d0a7c52af11184186bd7e6297fb761bebcbde.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
32de0993bcf732baddd380146e8009f4e004108cb7883b6e48fcbc5c9e48ca1e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
47583004588b256f019d58b713a937997ecef0edd4d8392a3f8836dedd537bca.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
58fadac0148f4700691a27abba4e41a0df870120ca131083c61a9404cf59cd99.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
5bcb59af1e8fdc9fb69507e4637417a278a508a73a46fcb1cb6472bf434d61c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
6e55f3939c54789579d9edaea7a64558acfd0452671c75dec280d3967cee4b05.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7974488bc67afaac8d23b7341dc9f5768ae9f7551986b8176038e4384fade015.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
835316bac6a8889d99c5d6d8e4efcab2f58dca79af1177a540dfd6310524959f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
9e24511e4ae502d0fa4c07e62872ab93857f9a90cc4305ad201c665bb7dabb1c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a9634fd1ba8044a7eab6578eb584c6d9fb03ce50d998b0cd9babf4950e75e22f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c1f424012a2d01ca458f9aa1aee9cfff75d79a0d7398ed9d13463a386f0c9297.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d73983a05531434ce8059cbecd66902874ebb8b890a3d571cf7d1a5b9808c76c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d7acd7c73cc74a8d699adc50bd3fd6a4f7a58beba960ec5bd429c4ad058a65c4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74.exe
Resource
win10v2004-20240426-en
General
-
Target
e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74.exe
-
Size
942KB
-
MD5
bba52e4949076e23493f303121140f12
-
SHA1
68fac8b6f4abca233af3fe66f8f956137d7e8bda
-
SHA256
e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74
-
SHA512
72bc8de3843e7100720b604e3156fe884f8f2b4a02d2c5b9b01c61caf6d1339b012ae339625e2032eeae6ef8bb90dcf6f87368830e193a3e6adb5b13efcb0911
-
SSDEEP
12288:1MrWy90qwwTA4eeGo83wqmLwhZ+tRnJlDXKmmp2zWuc+UNd0+u3zDOB2KtEJ4N6l:zyT/4PmsrgjlDXMoWD/gD3V40g088x
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral19/memory/1500-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral19/memory/1500-29-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral19/memory/1500-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023414-33.dat family_redline behavioral19/memory/4744-35-0x0000000000870000-0x00000000008A0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 3148 x3041458.exe 1972 x0935809.exe 1748 x3855419.exe 3416 g6636474.exe 4744 h5231884.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0935809.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3855419.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3041458.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3416 set thread context of 1500 3416 g6636474.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 4104 3416 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1792 wrote to memory of 3148 1792 e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74.exe 82 PID 1792 wrote to memory of 3148 1792 e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74.exe 82 PID 1792 wrote to memory of 3148 1792 e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74.exe 82 PID 3148 wrote to memory of 1972 3148 x3041458.exe 83 PID 3148 wrote to memory of 1972 3148 x3041458.exe 83 PID 3148 wrote to memory of 1972 3148 x3041458.exe 83 PID 1972 wrote to memory of 1748 1972 x0935809.exe 84 PID 1972 wrote to memory of 1748 1972 x0935809.exe 84 PID 1972 wrote to memory of 1748 1972 x0935809.exe 84 PID 1748 wrote to memory of 3416 1748 x3855419.exe 86 PID 1748 wrote to memory of 3416 1748 x3855419.exe 86 PID 1748 wrote to memory of 3416 1748 x3855419.exe 86 PID 3416 wrote to memory of 1756 3416 g6636474.exe 89 PID 3416 wrote to memory of 1756 3416 g6636474.exe 89 PID 3416 wrote to memory of 1756 3416 g6636474.exe 89 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 3416 wrote to memory of 1500 3416 g6636474.exe 90 PID 1748 wrote to memory of 4744 1748 x3855419.exe 94 PID 1748 wrote to memory of 4744 1748 x3855419.exe 94 PID 1748 wrote to memory of 4744 1748 x3855419.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74.exe"C:\Users\Admin\AppData\Local\Temp\e7a1c6bd3aba15347d3f975781da052144282ff4be210a7d47fa919718a09d74.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3041458.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3041458.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0935809.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0935809.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3855419.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3855419.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6636474.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6636474.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 5966⤵
- Program crash
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5231884.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5231884.exe5⤵
- Executes dropped EXE
PID:4744
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3416 -ip 34161⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD5d8050c8deeee7e32b9e1590cdacc9ce9
SHA11a453059b20191fffb80cb3df50a8c4d86655c27
SHA2561ec1a4407e6e89e354e98b2e71c01699a558b1162a260ec8044c3227f79b212e
SHA512d0065c931220cdd9fa9daa2791cbbd3c286f56b15223e698d3323627664d093b5a864e8062328af99288889ec7431ea82a7d1207fa858965db6ba40b79352332
-
Filesize
563KB
MD584c11718043a7223489608e0cf1d3862
SHA100125c2ecf62a9ab378b98209ba564086d2d2ce8
SHA256d25d74570e847f853a1de2eb7506f01af1aa9050317a32bf57f1fdcf6cd94b57
SHA512a55f55998efdada222d37fa768f76e99f81ea25cf92a3d1c76aa3eb1057e48f30885f35db5f31a23e7d506f36f5e348eae02491580482bebc1aa020b4799ba5b
-
Filesize
397KB
MD5fd6937a5b9d790da61447ada24ce64c6
SHA1dcd7f9e341ae313a516ace24be4c58a5d873c945
SHA256ee77d51fe149445ee6356ec003930deb130922bc485a86044d9eb8da5eaec2ea
SHA51260cdde8c717f20e04d9e70254e3d3457bf7f74fd2eaec4b29d27c1e405a82494d9ef4165b792c6028044a35d12f3f08261c0ec1bca8bbc8a4a525a60c49ed18d
-
Filesize
379KB
MD568d306db94ed0c2c3368c7f1996eebe4
SHA1ff29e458999dc872d779f1ff4a66edd87fd45158
SHA25636bb33f3f21f9b5f8dff30bc6a9b5b21108dab5dd6b03d29a15f1d39572a786c
SHA5120c35e6f3b908472799a37860c866f7cbf9fdbb8c1df9b6ff8b612fca168116be714a880eac5791522e91803028cb4be22aa13951d2a364cb63c24384898f5c0a
-
Filesize
174KB
MD5abeb13889416156609b938e05143441f
SHA176264e6c711f89fd8e96f6bb12be2a9867678259
SHA256ad04617501d41fb2040b041a74f0787b15932b1899e6a0dec2d1ae9ecbe05bc4
SHA512fe8832141d8e2a1d9fa6962f242a85a22ea07695615f31d8017a3bfbeeab65c9d5c0680180aa8feee5b453a473fa056d9da0638e27fe84894741c892554484b5