Overview
overview
10Static
static
31b7cbee30e...8d.exe
windows10-2004-x64
101cb2277eea...2a.exe
windows10-2004-x64
1026dae86d00...a2.exe
windows10-2004-x64
1035cd974b16...ec.exe
windows10-2004-x64
1045e7028a78...91.exe
windows10-2004-x64
104cd2f124df...48.exe
windows10-2004-x64
105fdef2b38d...0a.exe
windows10-2004-x64
107284e9e031...c7.exe
windows10-2004-x64
10781c022afd...54.exe
windows10-2004-x64
1084163f9b0d...a5.exe
windows10-2004-x64
1090251e43cd...e4.exe
windows10-2004-x64
109a3023ff33...37.exe
windows10-2004-x64
10b4b999d8f3...50.exe
windows7-x64
10b4b999d8f3...50.exe
windows10-2004-x64
10bdd93956fe...8b.exe
windows10-2004-x64
10cf840721c0...70.exe
windows10-2004-x64
10e52fb58b8a...f1.exe
windows10-2004-x64
10ecfbac56ff...9e.exe
windows10-2004-x64
10f0f492b9b0...9a.exe
windows10-2004-x64
10f921df4c23...0d.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
26dae86d0011ac84e93abfd2169b28a6dee3498b8be9c3b84f657506d4e2a9a2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
45e7028a78d903a8ece02b9d51f82b76972b2b5e64db0bc12aa6cb69f53a2291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cd2f124dfaf247a46d235c0823069c1056a2efb67c0f74547fb75dcfb603748.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7284e9e031d95f98bb1c673f3691adb26e5acc31e6d2c745b85bc97fc82edec7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
781c022afdd03ecc97a7195986c14b7a81fc5a02d1b0e8c7561a1a1ff3406754.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
84163f9b0d959067de44eac4cb117f34b55119476a35c8291d0be25585618ea5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9a3023ff334b34f4bea043eedeced95c41485b4799d3c2d56c0cb04b60143937.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf840721c08fa286313bd7ac68fc5bac88559652036dfbdcc7b3c6f0cfa13d70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
ecfbac56ff2c59238da4332d5cd1561d05a08ac0d65b57b9caf329f063fc939e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
f0f492b9b0439f9df9e575d91555b387484582434a05ee11e543b6cd24ed979a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f921df4c23777a797ffd956196cd2ea4805eaf3eefcc839de781c7e6af836f0d.exe
Resource
win10v2004-20240508-en
General
-
Target
90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe
-
Size
1.5MB
-
MD5
06af0401aecc9790eba539a0104ee492
-
SHA1
aab2d55f1489d364efe7b939eadb248b5022cba1
-
SHA256
90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4
-
SHA512
19561d373013c2148480b60e5682a6af820cdd9443bfd7ac31885d6f8706dbddf6a8ca823c8270e1aa71d02f85dd4bd7ced72b4923cfc6de8f57f641ff43860d
-
SSDEEP
24576:zykRQJVu8VgorcHsJvivI/xtXStQ+wc2ybyXaXNE74Nz5fPy+f1n7v72gEh:Gkyfu8VgorcHs9iW/yGXao+9LN7v72
Malware Config
Extracted
redline
kedru
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral11/memory/2204-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral11/memory/2204-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral11/memory/2204-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral11/files/0x000700000002343b-40.dat family_redline behavioral11/memory/1888-42-0x00000000001D0000-0x000000000020C000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3588 PF8JS6jI.exe 3096 KT0yk3eB.exe 3276 xH9kB2vw.exe 692 Lz5bv3kP.exe 1160 1ah95nh1.exe 1888 2Qv918ty.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" xH9kB2vw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Lz5bv3kP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" PF8JS6jI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" KT0yk3eB.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1160 set thread context of 2204 1160 1ah95nh1.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 460 1160 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4304 wrote to memory of 3588 4304 90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe 83 PID 4304 wrote to memory of 3588 4304 90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe 83 PID 4304 wrote to memory of 3588 4304 90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe 83 PID 3588 wrote to memory of 3096 3588 PF8JS6jI.exe 84 PID 3588 wrote to memory of 3096 3588 PF8JS6jI.exe 84 PID 3588 wrote to memory of 3096 3588 PF8JS6jI.exe 84 PID 3096 wrote to memory of 3276 3096 KT0yk3eB.exe 85 PID 3096 wrote to memory of 3276 3096 KT0yk3eB.exe 85 PID 3096 wrote to memory of 3276 3096 KT0yk3eB.exe 85 PID 3276 wrote to memory of 692 3276 xH9kB2vw.exe 86 PID 3276 wrote to memory of 692 3276 xH9kB2vw.exe 86 PID 3276 wrote to memory of 692 3276 xH9kB2vw.exe 86 PID 692 wrote to memory of 1160 692 Lz5bv3kP.exe 87 PID 692 wrote to memory of 1160 692 Lz5bv3kP.exe 87 PID 692 wrote to memory of 1160 692 Lz5bv3kP.exe 87 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 1160 wrote to memory of 2204 1160 1ah95nh1.exe 93 PID 692 wrote to memory of 1888 692 Lz5bv3kP.exe 97 PID 692 wrote to memory of 1888 692 Lz5bv3kP.exe 97 PID 692 wrote to memory of 1888 692 Lz5bv3kP.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe"C:\Users\Admin\AppData\Local\Temp\90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PF8JS6jI.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PF8JS6jI.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KT0yk3eB.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KT0yk3eB.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xH9kB2vw.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xH9kB2vw.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Lz5bv3kP.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Lz5bv3kP.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ah95nh1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ah95nh1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 5607⤵
- Program crash
PID:460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Qv918ty.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Qv918ty.exe6⤵
- Executes dropped EXE
PID:1888
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1160 -ip 11601⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5aec7b76c8c3c954cc7e94257f31e8b8c
SHA197e63aac098cdf4bfb5bde92f2f46f55a294fdfd
SHA256afe7248558713f8acf7c39c85b3a0a8f783bb2bb72cdd38aa42097906de07e1b
SHA5121252d4843335ec830a9ba96a64f46d3e76ffb591567299bf198d15e53788187deacf94c1a7637690dbfdf056943fff84df8a57ecc2b090434fda112836d37e6e
-
Filesize
1.2MB
MD5350b273927124dda717d49f5d4d2aa37
SHA1102110cc33f0d520ae0edcf8c828e1931a46ab31
SHA2565f9844aebb1a71d978d4f94b04502e7afad5bad66e85ef976f4016f9ea46717e
SHA512bc600ef070dedbf339c73112bdb24611ddf4507c9f26eafa9d0c0e26dd1b1ba5d2d056c608139ab426179eec5b5d7771fd206d419ed3be4ee6a1f54d1d8dc2c0
-
Filesize
768KB
MD5407c117980d1c20fb2a317f8b71e0a5d
SHA12321875fcc36370030bf5884659b3ebb61a2c421
SHA2562b94a27dfc42973064d60d19f07faf32b55ba8f5a09fd669df959b9b2f624271
SHA51229aee90ea399fac76c68b35185d70fc0c6f28ac7287fd39bb0247a1b419592d5c818293a95eb1467d337215629ad7bac1f6147a8e39258aa02893a95f85b3740
-
Filesize
573KB
MD56a2a6e714adea39d232a38e93acddf4c
SHA1f24ebc4142532ebfa82dd062c95744559f280c18
SHA256b3f5139e53257b58bbde7b442aaed89fd04750d5fa1b1b4fdf1fbc41db609fd6
SHA512036268fb2f1850c58361ece714a1c9708d9bf868967173ea351e3955a65276e2f576896f0e5bea50230a2af8da216d618d684cd2f6380fff1ed4949a842bbf7b
-
Filesize
1.1MB
MD5dbc35dd6e920a6317ad78a9b9c67633a
SHA1a758c9ff62b4630266c855ba09fd32e757790ea8
SHA256d45d227e5441db9335f21140b879a81af94d9a145b4e3a0fc740ec13f132d188
SHA512728b5f1c043184229597d01ddf3944030b660fa84e4d9aac162adb8b0dbaf4981dc50009bf0d697b90a8e7e0d9f42722d292cff6c25406bd7caa61b3482b484c
-
Filesize
219KB
MD5ef73b0024c8cda728f245dfe8bba4cc3
SHA1c3a0b07af09029f9c01f09eff256ae1de0fb5196
SHA2567a102bc16dc7769772efb6fcee29a3ee424391b337237ac088529530af560649
SHA51281841e93173d8a3ac5dc721f5699005ef12f33bfa55a8e7ef08ddb46ffb07c0e0286752dc9886473f4c6c0af0743e061eb8bd3161e47a9de3409a3d65f55955f