Overview
overview
10Static
static
3169827445a...fd.exe
windows10-2004-x64
102c5911fd0a...9f.exe
windows10-2004-x64
103d26ff1c7f...6f.exe
windows10-2004-x64
104316c9cb7f...d5.exe
windows10-2004-x64
10453554affb...f6.exe
windows10-2004-x64
104be48036db...87.exe
windows10-2004-x64
106843058b07...7b.exe
windows10-2004-x64
106ab7739b7f...d6.exe
windows10-2004-x64
10741b5d1728...11.exe
windows10-2004-x64
107dbaeca4ac...3f.exe
windows7-x64
107dbaeca4ac...3f.exe
windows10-2004-x64
10889f2baa64...76.exe
windows10-2004-x64
1092288ddafe...85.exe
windows10-2004-x64
109697ffb24d...50.exe
windows10-2004-x64
10abd0fa453e...b8.exe
windows10-2004-x64
10b28f0b1322...38.exe
windows10-2004-x64
10d89a055085...df.exe
windows10-2004-x64
10db77a8c068...dc.exe
windows7-x64
10db77a8c068...dc.exe
windows10-2004-x64
10e00e311d45...53.exe
windows10-2004-x64
10e0990290e3...28.exe
windows10-2004-x64
10fedbb32d49...4c.exe
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
3d26ff1c7f2a98b2c2c03ddc43bd17ad629931d425986a46cb7ba3ef54b1ba6f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4316c9cb7f9e1a073313300df45a90e9457dec01ec27e4f7c9725091247276d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
453554affb4477ef1397310265a6a90ae0953e5bca58d9b7b98e7323e7cccdf6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ab7739b7f0b5cc84bf55cd6f09beb3d4860ec6428202c54e8e023161020c8d6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
741b5d17281b7e19ee8dd529a91b547c0bdf8938c84539f745ec882d49373311.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win7-20240220-en
Behavioral task
behavioral11
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
889f2baa640211bf12947cfab6157ff93a774d0b4ed9568df0eb65952cedf576.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9697ffb24dfe38f4a40e3cf91464543c6f5a47170c56b58a949e1a93ab9df050.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
abd0fa453ed59d06e5c3d6cbafe873f404a47cab8f3c4bcd545fdfa7491ff4b8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b28f0b13221fc5aaa297029cc7c28a22c5b5dfe8aa6626036342ae0b862d8838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e00e311d4566f8b67392f945545d0e1ea579af2fa76c416042196eea3ca75753.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
e0990290e38dc94b3c6a8bd8d028c230706f11717bdc17beb40d9a73dcfb2628.exe
Resource
win10v2004-20240426-en
General
-
Target
6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe
-
Size
755KB
-
MD5
6e2b42c5af81be00ce089c6402751459
-
SHA1
e87e49393955166a1f1b1e3882b77d51085c2a8f
-
SHA256
6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b
-
SHA512
01149b34aaece48cdd430dc8c2a66907d3fb1580088718b2e80c783b8e9030c5c83cfa4b3c239ff0c68a7e5f465c173a0c93b6d32b311ac950369f157d775092
-
SSDEEP
12288:kMr4y90irAsuxGEW8QklzHVZOGhYZkqfzYiWW9rHZuU/kFuFadflBRX9gCemkfBL:0yNjCCkl7zY9LYR+bZuSKdTgCeLZLGrI
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral7/memory/4892-14-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral7/memory/4892-15-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral7/memory/4892-18-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral7/memory/4892-16-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x000700000002340a-20.dat family_redline behavioral7/memory/2120-22-0x0000000000270000-0x00000000002AE000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 772 bq3Ys3RM.exe 2192 1fO32Cv7.exe 2120 2UC641yc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" bq3Ys3RM.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2192 set thread context of 4892 2192 1fO32Cv7.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 1988 4892 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 872 wrote to memory of 772 872 6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe 83 PID 872 wrote to memory of 772 872 6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe 83 PID 872 wrote to memory of 772 872 6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe 83 PID 772 wrote to memory of 2192 772 bq3Ys3RM.exe 84 PID 772 wrote to memory of 2192 772 bq3Ys3RM.exe 84 PID 772 wrote to memory of 2192 772 bq3Ys3RM.exe 84 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 2192 wrote to memory of 4892 2192 1fO32Cv7.exe 86 PID 772 wrote to memory of 2120 772 bq3Ys3RM.exe 88 PID 772 wrote to memory of 2120 772 bq3Ys3RM.exe 88 PID 772 wrote to memory of 2120 772 bq3Ys3RM.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe"C:\Users\Admin\AppData\Local\Temp\6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bq3Ys3RM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bq3Ys3RM.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1fO32Cv7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1fO32Cv7.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 5405⤵
- Program crash
PID:1988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2UC641yc.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2UC641yc.exe3⤵
- Executes dropped EXE
PID:2120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4892 -ip 48921⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
559KB
MD5fe66a5deee1ea4ea59bb3cc4e309d7b4
SHA1e08f6208e7cb124f4d655f08b8d49fc153354329
SHA256fd22d5b519d3c3105daae2fd698cc78518f954890817e0c4482073d18d40d7e1
SHA5124b74d1220d7c6a9f9817af5b26da0594573825f4a606e3b5e0d95afb56f3fb8fd045d72bdf6a3d6267f8243d14727d5680afd881a8fd98937f499af8b8c30760
-
Filesize
1.0MB
MD55bb15970e4dfba4c58ed093c9eaca43b
SHA1706a3a95a40a6c7fb7b95104734e870e95ba0b95
SHA25637492176f6a586d694821e3cc96b899d6c44934d114b29229f22196cebe11322
SHA512bf0cc6e1c3f5d8057b0b5d6cf7582953a742e26ac218ef35a9911b0e13ebf3abef5c90c4fa8c870912bcfeac721ca0746f9f02624f5699126c93405ea5dff988
-
Filesize
222KB
MD5b731fa03a323e9d41349281baf184df7
SHA1ad52bf55a6584bb44709486c1859a0cfaf6506ac
SHA256cd2b9f42958eaf9d3303e017ee73fc1b8a2c4d13585a8c486d3ea7b6056ab43f
SHA5120b9e52b7b12f1ed54f9e8379fe0d67676abdc89d84b433ffbfc8f5516ede6bc5ebacbc0ee843a72acf26a9de7728f8356c6ff5a0c69e1f923eb569b9de50859b