Overview
overview
10Static
static
309aa894ba7...91.exe
windows7-x64
309aa894ba7...91.exe
windows10-2004-x64
100a8ac35e43...21.exe
windows10-2004-x64
101b7a61dc3f...51.exe
windows10-2004-x64
10551b1eafcb...e2.exe
windows10-2004-x64
107ca70af036...50.exe
windows10-2004-x64
108744deeac7...a9.exe
windows10-2004-x64
108b831a9336...51.exe
windows10-2004-x64
109bcf3e48a2...50.exe
windows10-2004-x64
109d0a8b0afa...78.exe
windows10-2004-x64
10a457720537...84.exe
windows10-2004-x64
10a6aa2043f4...84.exe
windows10-2004-x64
10b52c912b98...a3.exe
windows10-2004-x64
10b9636f454e...f7.exe
windows10-2004-x64
10b9cf5844f6...d1.exe
windows10-2004-x64
10bdef450da7...8e.exe
windows10-2004-x64
10eae63cf77a...de.exe
windows10-2004-x64
10f1c0aed941...02.exe
windows10-2004-x64
10f1cfe53024...42.exe
windows10-2004-x64
10f726f9f109...ad.exe
windows10-2004-x64
10fbaaf142d7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0a8ac35e43f621292035c3d74429426db38475babb90b9f0a7b48a6eb9e2d121.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
551b1eafcb4ad29033561c600fd2cd92b4dbcea53d7714de0fb1b61ceb59b6e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
7ca70af036250048ae92d2d5fde5b7a3179535a16c027d4f2bb5fa57b04f5550.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8b831a9336cb726a32f32c055467a35735f51b643a2cbb5d4269348fd570bb51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a4577205375947aa64ee39ff4d1938582d51a0f54aa5db974cf2942d70642f84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b52c912b9847cdf65a1dcf4bf8c550affc88bb7a8d9de2f77219a62d75890ea3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b9636f454e7a68c89164dedcf58da53a18aeb784c2db2df56f5684178058c7f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b9cf5844f6f5b6bc020ebfcf05d096f8176125e06f1618580463eca739c9b3d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eae63cf77a61c6d0fdef1aa4ee5b17218c6245ddb0a23c6b72a19176b5095ade.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f1c0aed941c5429f8f293ac0efea5efc12bafcadd77be2033716f222b3f38402.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f1cfe53024b51863e86f65b542899f29902cf448eed0ef609d8fa925d11e3542.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f726f9f1096ec4de08baa4d02b85caf3855704f948bf62de21cebf55aa17c9ad.exe
Resource
win10v2004-20240426-en
General
-
Target
9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe
-
Size
1.5MB
-
MD5
64f89290a64abad100d348699d1b9f44
-
SHA1
09d199723d53d631f91050622213908aff44c179
-
SHA256
9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78
-
SHA512
dd7767deedf6e5510b08661597d7b761728061108c5f5ac508462013e1e7e653ef017550dbe4ded32c4bb9927e8badb17b197fb3bd7a0673c84c188d05fc263e
-
SSDEEP
24576:fyOo2HDFMX0xNO2I9P8cgLXCB3slm7URSAP7nb1PD339S7wb:qOxHKJPqc6Ico+jDnb1b339S
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral10/memory/2084-35-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral10/memory/2084-36-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral10/memory/2084-39-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x00070000000233df-40.dat family_redline behavioral10/memory/4432-42-0x0000000000EF0000-0x0000000000F2E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3904 Qw3yG4lR.exe 4048 do1Sv5Ok.exe 740 Pb9dd0VC.exe 1268 BL4sU4GJ.exe 2284 1Mt19BO9.exe 4432 2TQ978oJ.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qw3yG4lR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" do1Sv5Ok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Pb9dd0VC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" BL4sU4GJ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2284 set thread context of 2084 2284 1Mt19BO9.exe 91 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2596 wrote to memory of 3904 2596 9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe 83 PID 2596 wrote to memory of 3904 2596 9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe 83 PID 2596 wrote to memory of 3904 2596 9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe 83 PID 3904 wrote to memory of 4048 3904 Qw3yG4lR.exe 84 PID 3904 wrote to memory of 4048 3904 Qw3yG4lR.exe 84 PID 3904 wrote to memory of 4048 3904 Qw3yG4lR.exe 84 PID 4048 wrote to memory of 740 4048 do1Sv5Ok.exe 86 PID 4048 wrote to memory of 740 4048 do1Sv5Ok.exe 86 PID 4048 wrote to memory of 740 4048 do1Sv5Ok.exe 86 PID 740 wrote to memory of 1268 740 Pb9dd0VC.exe 88 PID 740 wrote to memory of 1268 740 Pb9dd0VC.exe 88 PID 740 wrote to memory of 1268 740 Pb9dd0VC.exe 88 PID 1268 wrote to memory of 2284 1268 BL4sU4GJ.exe 90 PID 1268 wrote to memory of 2284 1268 BL4sU4GJ.exe 90 PID 1268 wrote to memory of 2284 1268 BL4sU4GJ.exe 90 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 2284 wrote to memory of 2084 2284 1Mt19BO9.exe 91 PID 1268 wrote to memory of 4432 1268 BL4sU4GJ.exe 92 PID 1268 wrote to memory of 4432 1268 BL4sU4GJ.exe 92 PID 1268 wrote to memory of 4432 1268 BL4sU4GJ.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe"C:\Users\Admin\AppData\Local\Temp\9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qw3yG4lR.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qw3yG4lR.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\do1Sv5Ok.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\do1Sv5Ok.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Pb9dd0VC.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Pb9dd0VC.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BL4sU4GJ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BL4sU4GJ.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Mt19BO9.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Mt19BO9.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2TQ978oJ.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2TQ978oJ.exe6⤵
- Executes dropped EXE
PID:4432
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5341488967341a386c73882ff2c5032bc
SHA1b5ab7b498165f0c34ef2d9088852d5b954e0694b
SHA2569d65593a9a386cfc9339b137224a1792799993451bcb75b85aa791e5cc8b8741
SHA512b698b9bdb801a0c722e6f8e42a40f044f794362b909543e3ed5074e22c39ec3d7a19152e3736ae13107d549564a06746c3f9ada5db172e91eb25bfab779a17ed
-
Filesize
1.1MB
MD5d99b638b264a548df0b9cb257a608d81
SHA1a5c7eb9255b217ab590fbdbf1aa7634b097ed0cc
SHA256ce86552959fc22e30d0a7aff974fd5975ae5994eecb9139fdf6e2d2c907e88d3
SHA51293f30dbba71d98136aa968582a05c7f7cafe4713dddf3d95cdb21c203fd00732bc0ad81e021c7e0b63b5f2dd9b8d6c6d95e6c416db2f579332c4839244fac051
-
Filesize
759KB
MD5fedb961ccf83ebda008b0e6fca014b50
SHA17f36728bdc104a115e92b032f1f8027f826e4fa0
SHA25658316a55dced5c6e6fd578569668d63088aed4f76bd6ced19a66d6c0336bbe11
SHA5125c891c780c5f33561254242b9d1e9eab7f3f9674e9eda071cfa09bd95c7b618f35483a7782ef4d2f21c4600c0ad98043a0f7634c1b8f07fe7d8f39f4742f78b3
-
Filesize
563KB
MD574a0395b9773b1d2d2ac9702de02db55
SHA1d6c90bd932b666d261d6f6127f9efe02f1529c5a
SHA256fdf409e4b9afba1811fccc16c798180ca12c7b1501b60228a05c3d449aefef24
SHA512a7b4b364a4b61c5bbccbf3d259cf649720bd21228fcb5b572ffdda582758c0989d2d72f34e89cad1a9e26a5011452adc3efdd7dda9bb10b3d9dc3ab85145ee50
-
Filesize
1.1MB
MD50076a07f79543bedf3b4d4a68f030b26
SHA18ba9850b4b5aabb9bbe96a4eb5162677be30f66f
SHA2569f2038b486ab98be401ab350faa34cbca920fef8870bc17bbf845b4d88aaac6c
SHA5121fce42b52b77c6a96ca39678d1e68a7fe221c0af1eee43e4bab84897a8e6094a020c586a9c9329f1b280d31140703c97f751ac53ff1664a9076137b53fce5637
-
Filesize
221KB
MD5e7fc26b1385384a1af2e9f91db5f6a94
SHA1e4ac2c59ca592037a3b53b7bea45d24866b699a8
SHA256d16e8d02b3965baaba0a7e55aee055d634372b872d6570f00370cd444fb85944
SHA512f0a47d7d80059b8801c582492dff7c6c76a02bc38bb09d250b7e083359fbaf2a21f8a340252062c76e6dcab383d7a2802fc9bd15de0d95292f200f1258996fdc