Overview
overview
10Static
static
309aa894ba7...91.exe
windows7-x64
309aa894ba7...91.exe
windows10-2004-x64
100a8ac35e43...21.exe
windows10-2004-x64
101b7a61dc3f...51.exe
windows10-2004-x64
10551b1eafcb...e2.exe
windows10-2004-x64
107ca70af036...50.exe
windows10-2004-x64
108744deeac7...a9.exe
windows10-2004-x64
108b831a9336...51.exe
windows10-2004-x64
109bcf3e48a2...50.exe
windows10-2004-x64
109d0a8b0afa...78.exe
windows10-2004-x64
10a457720537...84.exe
windows10-2004-x64
10a6aa2043f4...84.exe
windows10-2004-x64
10b52c912b98...a3.exe
windows10-2004-x64
10b9636f454e...f7.exe
windows10-2004-x64
10b9cf5844f6...d1.exe
windows10-2004-x64
10bdef450da7...8e.exe
windows10-2004-x64
10eae63cf77a...de.exe
windows10-2004-x64
10f1c0aed941...02.exe
windows10-2004-x64
10f1cfe53024...42.exe
windows10-2004-x64
10f726f9f109...ad.exe
windows10-2004-x64
10fbaaf142d7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0a8ac35e43f621292035c3d74429426db38475babb90b9f0a7b48a6eb9e2d121.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
551b1eafcb4ad29033561c600fd2cd92b4dbcea53d7714de0fb1b61ceb59b6e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
7ca70af036250048ae92d2d5fde5b7a3179535a16c027d4f2bb5fa57b04f5550.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8b831a9336cb726a32f32c055467a35735f51b643a2cbb5d4269348fd570bb51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a4577205375947aa64ee39ff4d1938582d51a0f54aa5db974cf2942d70642f84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b52c912b9847cdf65a1dcf4bf8c550affc88bb7a8d9de2f77219a62d75890ea3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b9636f454e7a68c89164dedcf58da53a18aeb784c2db2df56f5684178058c7f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b9cf5844f6f5b6bc020ebfcf05d096f8176125e06f1618580463eca739c9b3d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eae63cf77a61c6d0fdef1aa4ee5b17218c6245ddb0a23c6b72a19176b5095ade.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f1c0aed941c5429f8f293ac0efea5efc12bafcadd77be2033716f222b3f38402.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f1cfe53024b51863e86f65b542899f29902cf448eed0ef609d8fa925d11e3542.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f726f9f1096ec4de08baa4d02b85caf3855704f948bf62de21cebf55aa17c9ad.exe
Resource
win10v2004-20240426-en
General
-
Target
a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe
-
Size
1.3MB
-
MD5
315229a53aaa0d9b913b6459af465c47
-
SHA1
f05e4da7b3a14c6c12dea9433c815eb7689d2ca5
-
SHA256
a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784
-
SHA512
8c76d8b48f3889ffb3b40511e8111dbaf49e157208eb4670fcb4d778985067e01cf0382fba7540b3e9e4efe92437ffc0c93b6ac99d8c4b117f53cbb9a088fcdd
-
SSDEEP
24576:ByovW660WwC7kD3fHu3H37VNK8K6xELHizSn+O5GlBbok6N98:0R6+7g/u3LVN6/HizSnZ5EBbM
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral12/memory/3492-28-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral12/memory/3492-31-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral12/memory/3492-29-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral12/files/0x000700000002342b-34.dat family_redline behavioral12/memory/4812-35-0x00000000007F0000-0x000000000082E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 1548 XG4bL5PV.exe 4876 Od1Dq6GN.exe 3104 Zv8Gi4CM.exe 1964 1Pw95KJ9.exe 4812 2NN340IX.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" XG4bL5PV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Od1Dq6GN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Zv8Gi4CM.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1964 set thread context of 3492 1964 1Pw95KJ9.exe 91 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1548 2888 a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe 82 PID 2888 wrote to memory of 1548 2888 a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe 82 PID 2888 wrote to memory of 1548 2888 a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe 82 PID 1548 wrote to memory of 4876 1548 XG4bL5PV.exe 83 PID 1548 wrote to memory of 4876 1548 XG4bL5PV.exe 83 PID 1548 wrote to memory of 4876 1548 XG4bL5PV.exe 83 PID 4876 wrote to memory of 3104 4876 Od1Dq6GN.exe 84 PID 4876 wrote to memory of 3104 4876 Od1Dq6GN.exe 84 PID 4876 wrote to memory of 3104 4876 Od1Dq6GN.exe 84 PID 3104 wrote to memory of 1964 3104 Zv8Gi4CM.exe 86 PID 3104 wrote to memory of 1964 3104 Zv8Gi4CM.exe 86 PID 3104 wrote to memory of 1964 3104 Zv8Gi4CM.exe 86 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 1964 wrote to memory of 3492 1964 1Pw95KJ9.exe 91 PID 3104 wrote to memory of 4812 3104 Zv8Gi4CM.exe 93 PID 3104 wrote to memory of 4812 3104 Zv8Gi4CM.exe 93 PID 3104 wrote to memory of 4812 3104 Zv8Gi4CM.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe"C:\Users\Admin\AppData\Local\Temp\a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XG4bL5PV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XG4bL5PV.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Od1Dq6GN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Od1Dq6GN.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Zv8Gi4CM.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Zv8Gi4CM.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Pw95KJ9.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Pw95KJ9.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2NN340IX.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2NN340IX.exe5⤵
- Executes dropped EXE
PID:4812
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57d7c9e2c7f3bf9d709064cf98de80e43
SHA1bc0ccd3f18a7790ce6177fbdeeb78b0585cb1133
SHA2569c8865b20a66b79ba02e576ffbc001b8a76566518e3fe439b286ec535d3bc80d
SHA512d18a990ed0d3db346912e886f451f867fedf9737f5fd5a35e8a898e6a918884f059af7c25ee41a15032c8507a16a7c0010cbdcfb3d1d1d20c7b4da5231b57e95
-
Filesize
761KB
MD5d268c17c67e07bd15b1195e20075a9da
SHA1995c663a3cdb06e7615fa767fdd444763648265f
SHA256127dcec3745e9dc0c404cc1870182443e823d28a81753ccbac8328b976748d29
SHA512d2a21947a2431b715452122651eebf6bb71568e9f9bc664067acaf3e41ccab0b8cf8c811af6889b3d415f2d5c93af08e15faa8d335a91e3de93a5b67ec74ae68
-
Filesize
565KB
MD53cb7c260d1c96dece04b58535546a103
SHA10590dd3a589e0e45567249e3a6f2d971b4891984
SHA256e699a552a2286ff56015f6e7beeb32ed863f642929639e0752a304219c52ae2f
SHA512afa0f3a2f7450f6d514ed8807b252d60dfccf861cb73239f5b3d0304b9c0dc165219ca3948c5ffff95afc6b48ae7ea0595583739e0d5e203b03f7a1748cafc16
-
Filesize
1.1MB
MD5256f1d191f4d315919cdc14822bdb0b7
SHA100ffd4bfd14bedf167e2324198bcc211fe126edb
SHA2564357c9f6895febe6cffbe4abb8dfb4a47f02c8349d704b7d44779aafca7bd7d5
SHA512d983ccbb34043e5789f35d3ffccef834398782267f733e953be6f26560712be99758381b04e18d9e3974f6adf807d58742904d21068468a28e9544d8e34962c9
-
Filesize
221KB
MD5dc71231a52e151cc29472970246dddab
SHA16a9b5556f2ed157b814afb3ec3f429333a431774
SHA256225b0fbf0506f1a6035746360f08dd2a1d99020d45b3178443c281814b493f56
SHA51273d9bff8adf69cc1f3f339d8e38284435a5b6bc581a8692deeb6c27e413b4b9a09069bd8ba63816f20c47a9a3e4c10948d09a4360b98d070fd76aed4125e3371