Overview
overview
10Static
static
31b7cbee30e...8d.exe
windows10-2004-x64
101cb2277eea...2a.exe
windows10-2004-x64
1026dae86d00...a2.exe
windows10-2004-x64
1035cd974b16...ec.exe
windows10-2004-x64
1045e7028a78...91.exe
windows10-2004-x64
104cd2f124df...48.exe
windows10-2004-x64
105fdef2b38d...0a.exe
windows10-2004-x64
107284e9e031...c7.exe
windows10-2004-x64
10781c022afd...54.exe
windows10-2004-x64
1084163f9b0d...a5.exe
windows10-2004-x64
1090251e43cd...e4.exe
windows10-2004-x64
109a3023ff33...37.exe
windows10-2004-x64
10b4b999d8f3...50.exe
windows7-x64
10b4b999d8f3...50.exe
windows10-2004-x64
10bdd93956fe...8b.exe
windows10-2004-x64
10cf840721c0...70.exe
windows10-2004-x64
10e52fb58b8a...f1.exe
windows10-2004-x64
10ecfbac56ff...9e.exe
windows10-2004-x64
10f0f492b9b0...9a.exe
windows10-2004-x64
10f921df4c23...0d.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
26dae86d0011ac84e93abfd2169b28a6dee3498b8be9c3b84f657506d4e2a9a2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
45e7028a78d903a8ece02b9d51f82b76972b2b5e64db0bc12aa6cb69f53a2291.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
4cd2f124dfaf247a46d235c0823069c1056a2efb67c0f74547fb75dcfb603748.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7284e9e031d95f98bb1c673f3691adb26e5acc31e6d2c745b85bc97fc82edec7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
781c022afdd03ecc97a7195986c14b7a81fc5a02d1b0e8c7561a1a1ff3406754.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
84163f9b0d959067de44eac4cb117f34b55119476a35c8291d0be25585618ea5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9a3023ff334b34f4bea043eedeced95c41485b4799d3c2d56c0cb04b60143937.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
cf840721c08fa286313bd7ac68fc5bac88559652036dfbdcc7b3c6f0cfa13d70.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ecfbac56ff2c59238da4332d5cd1561d05a08ac0d65b57b9caf329f063fc939e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f0f492b9b0439f9df9e575d91555b387484582434a05ee11e543b6cd24ed979a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f921df4c23777a797ffd956196cd2ea4805eaf3eefcc839de781c7e6af836f0d.exe
Resource
win10v2004-20240508-en
General
-
Target
e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe
-
Size
1.5MB
-
MD5
8fde3216e73d756d94ba8e15320501fa
-
SHA1
247978fa6f3bb3f35054d83b48d7a9c53d32e85c
-
SHA256
e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1
-
SHA512
2ef546b5120aa44843ba0333082306f818bed77c64a274eeabb26a0e1f020016eedddcc0cdb074caf08c0d236ebe3ae17fc6e6c0e188e3d221c307a5a3e3731e
-
SSDEEP
24576:NyFZjHfm47W10kxzv7SDFyMr8JC0dzCHDRwTeFq9HA7Yxm5NPwl:ozjHfm4aTxzv7SYcMASTaQxm5NI
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral17/memory/2872-35-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral17/memory/2872-40-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral17/memory/2872-38-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xt303sh.exe family_redline behavioral17/memory/1944-42-0x00000000006C0000-0x00000000006FE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
hM8MO0HH.exeTV0Xa7Bv.exeBg7ip6MY.exeJM7zm1Od.exe1pZ36YP1.exe2xt303sh.exepid process 2540 hM8MO0HH.exe 5016 TV0Xa7Bv.exe 3908 Bg7ip6MY.exe 2772 JM7zm1Od.exe 3252 1pZ36YP1.exe 1944 2xt303sh.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
TV0Xa7Bv.exeBg7ip6MY.exeJM7zm1Od.exee52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exehM8MO0HH.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" TV0Xa7Bv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Bg7ip6MY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" JM7zm1Od.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" hM8MO0HH.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1pZ36YP1.exedescription pid process target process PID 3252 set thread context of 2872 3252 1pZ36YP1.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exehM8MO0HH.exeTV0Xa7Bv.exeBg7ip6MY.exeJM7zm1Od.exe1pZ36YP1.exedescription pid process target process PID 4984 wrote to memory of 2540 4984 e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe hM8MO0HH.exe PID 4984 wrote to memory of 2540 4984 e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe hM8MO0HH.exe PID 4984 wrote to memory of 2540 4984 e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe hM8MO0HH.exe PID 2540 wrote to memory of 5016 2540 hM8MO0HH.exe TV0Xa7Bv.exe PID 2540 wrote to memory of 5016 2540 hM8MO0HH.exe TV0Xa7Bv.exe PID 2540 wrote to memory of 5016 2540 hM8MO0HH.exe TV0Xa7Bv.exe PID 5016 wrote to memory of 3908 5016 TV0Xa7Bv.exe Bg7ip6MY.exe PID 5016 wrote to memory of 3908 5016 TV0Xa7Bv.exe Bg7ip6MY.exe PID 5016 wrote to memory of 3908 5016 TV0Xa7Bv.exe Bg7ip6MY.exe PID 3908 wrote to memory of 2772 3908 Bg7ip6MY.exe JM7zm1Od.exe PID 3908 wrote to memory of 2772 3908 Bg7ip6MY.exe JM7zm1Od.exe PID 3908 wrote to memory of 2772 3908 Bg7ip6MY.exe JM7zm1Od.exe PID 2772 wrote to memory of 3252 2772 JM7zm1Od.exe 1pZ36YP1.exe PID 2772 wrote to memory of 3252 2772 JM7zm1Od.exe 1pZ36YP1.exe PID 2772 wrote to memory of 3252 2772 JM7zm1Od.exe 1pZ36YP1.exe PID 3252 wrote to memory of 1436 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 1436 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 1436 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 3252 wrote to memory of 2872 3252 1pZ36YP1.exe AppLaunch.exe PID 2772 wrote to memory of 1944 2772 JM7zm1Od.exe 2xt303sh.exe PID 2772 wrote to memory of 1944 2772 JM7zm1Od.exe 2xt303sh.exe PID 2772 wrote to memory of 1944 2772 JM7zm1Od.exe 2xt303sh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe"C:\Users\Admin\AppData\Local\Temp\e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hM8MO0HH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hM8MO0HH.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TV0Xa7Bv.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TV0Xa7Bv.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bg7ip6MY.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bg7ip6MY.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JM7zm1Od.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JM7zm1Od.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1pZ36YP1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1pZ36YP1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1436
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xt303sh.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xt303sh.exe6⤵
- Executes dropped EXE
PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51c0d9af819cf3897dba318dfdd3f2144
SHA1de965fc89f14faff830011170e9907ac404941ee
SHA25684b80038724ed8b3b0a2c4d4ab9f8ff63f6cafda1ed0501aa62b12ee3e21a141
SHA512bf116742ec44216191670877703b8ae86ff54267d794ad68e3bc5d5b5c2e9ab7d57c4ce44c33e5bcf3c48bbca7987046a40d32a6d48fb51f7b9ff79361335a64
-
Filesize
1.2MB
MD561e454b7082a71aa961ae347e18f7ace
SHA14034c83996f018e6f61fbfc55f908c7b27360223
SHA256f41f53cdc3886c1309baa7fdf6abf4ba4451c975d88aeb61d53066cdecf7160e
SHA5120a73f7f274e544ee1727cc3ffef900b6344ef4113461226f9cea6a870f71a1aefb4febb5c5aa855bd76989e166ebf9f8b0a70afd033359721bea125becdc6dbf
-
Filesize
761KB
MD5ddb027bd044817d47ab24044373323c5
SHA151b220bacd81d1e6e007941fb7cd9e6fd49c1b7b
SHA25625333906f25486771d7c537a3530aeffeb64792729fe713bd1c4d2f5dc6b44cd
SHA51290d20a58f498b2e69706fc767ce9cbf4ff5a3791ead3dbd76fc57c8a79c5c031a8ca97eaa13e0dcb961622e49ead3965c80df8d3416d4a7541bc066bc8d2b3f8
-
Filesize
565KB
MD5b74cfc0a0207c582921e896638d0741f
SHA161a4550862c494d7051dd2b4af093df37b4d59e6
SHA2562bd117e1a78c5f98156f91a4aa479de25795d26f21bd9780bdb981c373a0238a
SHA512e904c8c659a31fe189a3818fc1e5f5a02ec8d6701c2795b6461ebababa2e227a86493e0f7268d1fdbdbd5aa48ff5d8944f9eb8dbed1d9dcf759a256ad388f575
-
Filesize
1.1MB
MD535675cf37bd56208a02fef8ca5ef9ae6
SHA1cf4698b94a76490f3bad33806f3596b7909fe5ac
SHA256726c63af44686aa39f64a6af8916bb7cb226be2882b8c1c81941305b597887aa
SHA512f0d8013ab8ffd6667bcaa34391e80250f34f25d8a6872a2d20084b092b0fe8002f261001fa25876ecb6dd2ba7b2e25cba292e1b74282b3c3b0f36072c4b00f6c
-
Filesize
221KB
MD51d2cb41ec32c0bd63299dc264427f10c
SHA1cac5b6f4b6f6470b39874a55bad9f95eb3e7b4ee
SHA25629cdc6560875c26c691b5f34244d4d52c4c12c5150e64abac0c2f2206623fb84
SHA5121815588ae3f5aeb4ab780d53a028a895a97ad08cde91f946db68a3e8c14f4907d2b98866f9b67839a6331c6a871640751bbb1db040d3492fee4e93e4be5c3351