Overview
overview
10Static
static
3169827445a...fd.exe
windows10-2004-x64
102c5911fd0a...9f.exe
windows10-2004-x64
103d26ff1c7f...6f.exe
windows10-2004-x64
104316c9cb7f...d5.exe
windows10-2004-x64
10453554affb...f6.exe
windows10-2004-x64
104be48036db...87.exe
windows10-2004-x64
106843058b07...7b.exe
windows10-2004-x64
106ab7739b7f...d6.exe
windows10-2004-x64
10741b5d1728...11.exe
windows10-2004-x64
107dbaeca4ac...3f.exe
windows7-x64
107dbaeca4ac...3f.exe
windows10-2004-x64
10889f2baa64...76.exe
windows10-2004-x64
1092288ddafe...85.exe
windows10-2004-x64
109697ffb24d...50.exe
windows10-2004-x64
10abd0fa453e...b8.exe
windows10-2004-x64
10b28f0b1322...38.exe
windows10-2004-x64
10d89a055085...df.exe
windows10-2004-x64
10db77a8c068...dc.exe
windows7-x64
10db77a8c068...dc.exe
windows10-2004-x64
10e00e311d45...53.exe
windows10-2004-x64
10e0990290e3...28.exe
windows10-2004-x64
10fedbb32d49...4c.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
3d26ff1c7f2a98b2c2c03ddc43bd17ad629931d425986a46cb7ba3ef54b1ba6f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4316c9cb7f9e1a073313300df45a90e9457dec01ec27e4f7c9725091247276d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
453554affb4477ef1397310265a6a90ae0953e5bca58d9b7b98e7323e7cccdf6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ab7739b7f0b5cc84bf55cd6f09beb3d4860ec6428202c54e8e023161020c8d6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
741b5d17281b7e19ee8dd529a91b547c0bdf8938c84539f745ec882d49373311.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win7-20240220-en
Behavioral task
behavioral11
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
889f2baa640211bf12947cfab6157ff93a774d0b4ed9568df0eb65952cedf576.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9697ffb24dfe38f4a40e3cf91464543c6f5a47170c56b58a949e1a93ab9df050.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
abd0fa453ed59d06e5c3d6cbafe873f404a47cab8f3c4bcd545fdfa7491ff4b8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b28f0b13221fc5aaa297029cc7c28a22c5b5dfe8aa6626036342ae0b862d8838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e00e311d4566f8b67392f945545d0e1ea579af2fa76c416042196eea3ca75753.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
e0990290e38dc94b3c6a8bd8d028c230706f11717bdc17beb40d9a73dcfb2628.exe
Resource
win10v2004-20240426-en
General
-
Target
92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe
-
Size
1.5MB
-
MD5
425c8308ba915888c763598588323ac2
-
SHA1
9410ce870c4ce520e471918f4aae9483b41c6b07
-
SHA256
92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85
-
SHA512
01ab83ce85b80e525c78b09b80092154fb7546340e848706e1ca2d4133b41e04725bbca849fa5c2c1e9eab4fbcf2a181e2eb86a7e8d5ec190f1caf25da3a7436
-
SSDEEP
24576:ZyRdA6tQPlsQxiyNcQwRZxDbV8Gubb2XY04aiWWcREuLBu1uAhzOkZ86+Hy:MRdAHlsQxiMwfRJ8Gkw4HtYBu1ucCy8n
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral13/memory/4932-36-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral13/memory/4932-35-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral13/memory/4932-38-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral13/files/0x00070000000233e0-40.dat family_redline behavioral13/memory/2180-42-0x0000000000950000-0x000000000098E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4848 xM5zw6Ii.exe 3796 PD7nI5CD.exe 428 El2Fn6xo.exe 4340 zM0Xm0bU.exe 2140 1UM42uf1.exe 2180 2nV349DO.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" PD7nI5CD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" El2Fn6xo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" zM0Xm0bU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" xM5zw6Ii.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2140 set thread context of 4932 2140 1UM42uf1.exe 90 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2932 wrote to memory of 4848 2932 92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe 82 PID 2932 wrote to memory of 4848 2932 92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe 82 PID 2932 wrote to memory of 4848 2932 92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe 82 PID 4848 wrote to memory of 3796 4848 xM5zw6Ii.exe 83 PID 4848 wrote to memory of 3796 4848 xM5zw6Ii.exe 83 PID 4848 wrote to memory of 3796 4848 xM5zw6Ii.exe 83 PID 3796 wrote to memory of 428 3796 PD7nI5CD.exe 85 PID 3796 wrote to memory of 428 3796 PD7nI5CD.exe 85 PID 3796 wrote to memory of 428 3796 PD7nI5CD.exe 85 PID 428 wrote to memory of 4340 428 El2Fn6xo.exe 87 PID 428 wrote to memory of 4340 428 El2Fn6xo.exe 87 PID 428 wrote to memory of 4340 428 El2Fn6xo.exe 87 PID 4340 wrote to memory of 2140 4340 zM0Xm0bU.exe 88 PID 4340 wrote to memory of 2140 4340 zM0Xm0bU.exe 88 PID 4340 wrote to memory of 2140 4340 zM0Xm0bU.exe 88 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 2140 wrote to memory of 4932 2140 1UM42uf1.exe 90 PID 4340 wrote to memory of 2180 4340 zM0Xm0bU.exe 91 PID 4340 wrote to memory of 2180 4340 zM0Xm0bU.exe 91 PID 4340 wrote to memory of 2180 4340 zM0Xm0bU.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe"C:\Users\Admin\AppData\Local\Temp\92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xM5zw6Ii.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xM5zw6Ii.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PD7nI5CD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PD7nI5CD.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\El2Fn6xo.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\El2Fn6xo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zM0Xm0bU.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zM0Xm0bU.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1UM42uf1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1UM42uf1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2nV349DO.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2nV349DO.exe6⤵
- Executes dropped EXE
PID:2180
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e70923307d10721689c5561892f8c55f
SHA14e532bfdb5a295402a0bb47afa7f68b83550d723
SHA2562d385a948fe63e837541d02d401177251cff9194d59b7e0c619264f0dab64b02
SHA512cc868634491ea7e3cb69af41c37558017bc42ac843477a4db734188333871a3797d936ada11aa14abfe957b19fb3842f6daf85fd255a7af8470c610639aabbb8
-
Filesize
1.1MB
MD5be53836db15b8dfc390ce7957889f3a4
SHA1cb8e9bdb97b8b31dd476f91a7f26d43f96050237
SHA256d092e25ae7bea9f604bd113798d663474f73dc51adc9b5a5d7eaa847f33dbe9b
SHA5128f876faecab2e77065d5cf4b1c251723767ad0e8ced84f69bab34ca099848da4c42be46945abf77cd9e5a0858724ecd0828e8bbca4c3335dc7569b2aa342b90a
-
Filesize
758KB
MD59e94ef1b931f68f722a69465756bbe30
SHA1f32835ba07cd05bbc2311939ce3b4117f67f21ab
SHA256c4250eab48d9405545214da261a19ccd6e3e4652a5bde20d9e585bf9e80f2201
SHA512890469d459e8743b9dbda8b23cf140b4f650c3a6de8c8727f80fa0f776f95102c65d1d1f7076fb21a92c816ca090bae141e104ba1a6b8f6c4102355d45739b40
-
Filesize
562KB
MD5bb4821e16408061fd669b608ba7914e6
SHA12a82f9a9d07bcec6d6a05514a492d6f58c9746f7
SHA256730c808381a1f128a4f6f1004ea0156e2c76731f7cdb44781b8f2286024427a1
SHA5127eafb112c9a36207ac01e99185474190334901d196f7fcdcc74f0a4d1e043e9a7aace065a3a46dbd4d854df8ba92593847a00a7517947b11c6df1d6c62144f35
-
Filesize
1.1MB
MD5a07c046be4d31f27ce12d25923953f66
SHA1f7647894a3eff651fd9b5c58bdef50dd753ac3f0
SHA256b0de5b7b284346e3d289e11608df560463a4235371a357caba7500af40d6eca8
SHA5121877bf0fc1a1d477cdeec7a06ead33d8a113c877a9ed371ad966c9b405ff0354ffa5c49a138b86eed31e9fe4c92342ce9c693abc88174833f85f2a4720eeca4a
-
Filesize
222KB
MD5d1b3b07728c3768f9c0871c4cc6e0738
SHA1ef37d8cb41d26dedcaf6c9645dc343f0fdf7b567
SHA256b567bc4b9b529a67ea1c785cfe0541df26c68b037219f58d0a00baca429903b9
SHA51269f31b063e7b6e5a737c0fc4ab32d8af62fa844e9f80e316b1c82c79d80274993857d5c0629456c243ea7d48fbbea0bfb889112ec35687c8d655119c3a09061f