Overview
overview
10Static
static
30805913f50...13.exe
windows10-2004-x64
1011eba51293...3a.exe
windows10-2004-x64
1017a0568b20...3a.exe
windows10-2004-x64
10346c46bc82...26.exe
windows10-2004-x64
104867af9d5d...1f.exe
windows10-2004-x64
105f2f269e1f...9a.exe
windows10-2004-x64
1064e73ef21d...a1.exe
windows10-2004-x64
107c556f6f80...61.exe
windows10-2004-x64
108c970cc94c...d3.exe
windows10-2004-x64
109296923f57...24.exe
windows10-2004-x64
10ae96a881fd...69.exe
windows10-2004-x64
10b150b2b6ed...d5.exe
windows10-2004-x64
10c1b0ce286b...51.exe
windows10-2004-x64
10c1d1b117a2...35.exe
windows10-2004-x64
10d876400b35...04.exe
windows10-2004-x64
10eb3bd6af82...52.exe
windows10-2004-x64
10eb7c2e9dc2...28.exe
windows10-2004-x64
10ed2eb0d5dc...bf.exe
windows10-2004-x64
10fc2a396813...13.exe
windows10-2004-x64
10fd4ce916b7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
0805913f5039b1097cf6d0b178560036e0b99e52f86b3990bf7bd4b663d15513.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
11eba512939d3d17bcd0d5543f3a05dac69c96858fbb7120b8802814391c413a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
17a0568b2023370d14f35371e9d7c372589b91d4098eecace76d78c9a7587d3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
4867af9d5dda04a5ea012b876f663ee94f708e52fd230c829517d4b2b83e9d1f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
64e73ef21d2b9d5819334be729f07ac670e6fa83111bc1b666abffc261bc2da1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7c556f6f80bf250c2ce70d007250b6906c79d457969a75a3f17dc9885daf8761.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
8c970cc94c6aab0b503af6d60e60f5c6c870576c82be9233ab884894899a97d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9296923f571779b37e571b296a597c9c5eb71a0a616bfd3ddab9f7d20c509c24.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
ae96a881fddd0471c5a462a0b27848d72c34ba866c6061e0f84ab3a1097a7a69.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
b150b2b6edd507299c5ac9c6a165df425596a5b2a6f78c7ee7594e3f19a28fd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
eb7c2e9dc2416d5168ea11cdee85ea662e4aa32921edbe521787e1a7dcc79228.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
fc2a3968133c3c96ae55dfdd56ca5b4dd51ed30658a98d55193b96e1533f4013.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe
Resource
win10v2004-20240226-en
General
-
Target
ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe
-
Size
943KB
-
MD5
6df35c0bf802827179491a87b3fcaef6
-
SHA1
6c11c82d7422d46b4d1e143f25e3ae467c81eb01
-
SHA256
ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf
-
SHA512
184e32ed3c876db2b436ed847e6e485fe836ff40ea52bea0d79fa255ebc55e20427ff55dfeb5c197591f29e83565acd533745a0fcd0f59b04e7a153279dc7e69
-
SSDEEP
24576:+y3lCj5PuU09H6ASUTFegI5QEpHUVDus7CY7:NI5a9HHxbUHGRCY
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral18/memory/3984-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral18/memory/3984-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral18/memory/3984-29-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral18/files/0x0007000000023467-34.dat family_redline behavioral18/memory/4228-35-0x0000000000F90000-0x0000000000FC0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 4004 x9389096.exe 2996 x0004138.exe 3116 x2251657.exe 3656 g8133913.exe 4228 h6239764.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9389096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0004138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2251657.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3656 set thread context of 3984 3656 g8133913.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 1032 3656 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 388 wrote to memory of 4004 388 ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe 84 PID 388 wrote to memory of 4004 388 ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe 84 PID 388 wrote to memory of 4004 388 ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe 84 PID 4004 wrote to memory of 2996 4004 x9389096.exe 85 PID 4004 wrote to memory of 2996 4004 x9389096.exe 85 PID 4004 wrote to memory of 2996 4004 x9389096.exe 85 PID 2996 wrote to memory of 3116 2996 x0004138.exe 86 PID 2996 wrote to memory of 3116 2996 x0004138.exe 86 PID 2996 wrote to memory of 3116 2996 x0004138.exe 86 PID 3116 wrote to memory of 3656 3116 x2251657.exe 87 PID 3116 wrote to memory of 3656 3116 x2251657.exe 87 PID 3116 wrote to memory of 3656 3116 x2251657.exe 87 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3656 wrote to memory of 3984 3656 g8133913.exe 90 PID 3116 wrote to memory of 4228 3116 x2251657.exe 94 PID 3116 wrote to memory of 4228 3116 x2251657.exe 94 PID 3116 wrote to memory of 4228 3116 x2251657.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe"C:\Users\Admin\AppData\Local\Temp\ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9389096.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9389096.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0004138.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0004138.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2251657.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2251657.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8133913.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8133913.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 5926⤵
- Program crash
PID:1032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6239764.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6239764.exe5⤵
- Executes dropped EXE
PID:4228
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3656 -ip 36561⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD5b2c83ae704ff4b5e21cfc731657b3b9a
SHA17742b1406ef7d992b7adf6fdb9011a9e0ec8578a
SHA2564cba9cda839039348737d7a8ba19bf5c557c9292ac9353eca3b0ffc588f629eb
SHA5126b6e81740df9ba5247cda80ac83f2b2edad79ec724ad425aa8c942db9cf99c9c043bb5b4a7d5fcf98b164e226de56c3b1564c07b17790a2bbc410fbc68185fda
-
Filesize
563KB
MD57bc0639249026e5a29de7b1c978fe181
SHA19d6d3c1cd70b7823f396216dc30fdf93c0d839f9
SHA2563767ef27a0b9c9e968b63738065004153d0974b7e64d0cae87060d7b3d5491df
SHA5129d75780aab4f862b120788807fa3cddc49c0822aedf4bcffc0e024478c4eb2043d0cd88fbda6c0c7e11b7425ad4dffa9c818ea338fff3b1b61971cb7f722ee62
-
Filesize
397KB
MD5fa76b6e7273f7c05818d9d35ca5c5595
SHA1bc74034338bd86f819a0c65d28830e06e151bf63
SHA256d620c60c5ceadb6ceabc71237bd21dcbbf89c967eb2e5c3ccc20ff31bfdc0c08
SHA512570e1ad2daffcd25e395a70ee7935dbeade06ca3dcafee3617a25263f07cee2f1f3893dc3fe4e281c7c63666ad6d8f6350b0a61e46109afed782e7542770da78
-
Filesize
379KB
MD5897eb703a928d4225e5d0f2d4beb0ee2
SHA10bba11833e4dbebebeb672ab6882e5ef40999353
SHA2561fcd9a084b8f90b5adaf3c09a30935bd1830d8a22928495e0d2b929866b3d672
SHA5124b209e74f32f990cd7b1ab276380d82cb45f179c69e422e964a89c07621d79a40b5df1e8cd1375527ffdb1c4206abcc95c3a7a49685fdd54ce97d9341a39439f
-
Filesize
174KB
MD5e466c3b3ab599efc34c1e2b92a32fec7
SHA179a50ad575a07fa344971f4d8f9a585073200d3a
SHA256d7af7a724e8f457c74b970a15d47d23906c0fc93f0060a27bbf6ff4d2880e5c9
SHA5120f0e1f380201599461183e3f480310b595dad58c05abe97bc204b48ddd098a342902a32ea528ddd695ddfe8253a6127284a3d084e264a9ac600a24761e14ffbb