Overview
overview
10Static
static
31bd70f5afc...20.exe
windows10-2004-x64
1020d5ad811e...b7.exe
windows10-2004-x64
102ca6e4b470...97.exe
windows10-2004-x64
1030323f682e...18.exe
windows10-2004-x64
10426e1b8066...18.exe
windows10-2004-x64
1043ea4b5927...9e.exe
windows10-2004-x64
1044ba27c950...f2.exe
windows10-2004-x64
106e35231281...45.exe
windows10-2004-x64
107cac44d1ec...c4.exe
windows10-2004-x64
10823db2b88d...40.exe
windows10-2004-x64
10a884418225...db.exe
windows10-2004-x64
10c68d91a00f...d2.exe
windows10-2004-x64
10cabcad649e...d3.exe
windows7-x64
10cabcad649e...d3.exe
windows10-2004-x64
10cb4c64011d...ef.exe
windows10-2004-x64
10d55f431b8e...57.exe
windows10-2004-x64
10dea00ebf60...e0.exe
windows10-2004-x64
10e017c199a6...9b.exe
windows10-2004-x64
10e01acda385...7b.exe
windows10-2004-x64
10e46b62442d...14.exe
windows10-2004-x64
10ef7029b98b...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
1bd70f5afcc29724401d52710f012058d999560c75bde3fd609f66ffc0bd9720.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
20d5ad811e156e522c088718e9fad42c9719bbca8aa4b3f144c468550177d6b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2ca6e4b470413b98976384ac3e479028c30b8486b2ebb4a4dd8e4e2142faac97.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
30323f682e6a32aa6d849428448a5ebd9b9590ee3a331da4fd2f5934b4c13818.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
426e1b8066ed7b417a0887d9af5ab1436b8302f01a33910c8c64da68d5b06c18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
43ea4b5927abdf60c2312374034e3b21c33a1082d31190027a6b747b84aef49e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
44ba27c950b0c14f429cb6252215fa6bdf9cb6c714a1890cbaae75274f91f4f2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6e352312813a28290ff0ff1a92702c185aae40663ba027e0a0c2d464d283d345.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7cac44d1ecd3f5639f33ee135e671d1baab428e0ead20f5eae7b4d2be71debc4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
823db2b88de38daac96f8e746abe924341117f170be5cd8a57a2db86d001bc40.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
cabcad649e33f7f4e2ee71f0de68902c08004e3587dd364c97b12d067acbd6d3.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
cabcad649e33f7f4e2ee71f0de68902c08004e3587dd364c97b12d067acbd6d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
cb4c64011df6d9448d6e9f657a89d6cc8dfd2b81fc8262bccfab2f05465c39ef.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
dea00ebf6034d535aea8f56cd6017972814dfb3374887346a9c9c8182c1110e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e017c199a693aee53fef17402d6258dee359f1092c5845f73d404e2646590b9b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e01acda3856cc169ddd84def2f4c60a6487d82da3d3c35333bff09986229bd7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ef7029b98b2432c74d1512668109e659b6f7e89d2d4469a291c54309ecec0878.exe
Resource
win10v2004-20240508-en
General
-
Target
c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe
-
Size
1.3MB
-
MD5
de7d8d1ea9ec74fca10fd63873b1fde4
-
SHA1
4c951da991a818ce7f8abe42f63ffb431a852a47
-
SHA256
c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2
-
SHA512
e32819236f4147eae4ab734405e3a1807697cdfbd063587f42a5bb9914dd9f4bfc98f73a0b4e917da72bf0a2da8782a93fe0d151697a19db47d23d323e60f53f
-
SSDEEP
24576:myK5ZJS6E1Nqug0ntSTM5GI+Xt3LEttlYWo7vKxso44vrtH9ex4mkQdmNIH:1oPbqNqp0tv+Bvjmsd4vFkx2gmNI
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral12/memory/4500-28-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral12/memory/4500-31-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral12/memory/4500-29-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral12/files/0x00070000000233e3-33.dat family_redline behavioral12/memory/2216-35-0x0000000000600000-0x000000000063E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 3300 ql4AI4lx.exe 824 PC1cQ4eU.exe 876 Hc5rb7Tq.exe 2148 1WH82Ow5.exe 2216 2za053eb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Hc5rb7Tq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ql4AI4lx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" PC1cQ4eU.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 4500 2148 1WH82Ow5.exe 85 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1500 wrote to memory of 3300 1500 c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe 81 PID 1500 wrote to memory of 3300 1500 c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe 81 PID 1500 wrote to memory of 3300 1500 c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe 81 PID 3300 wrote to memory of 824 3300 ql4AI4lx.exe 82 PID 3300 wrote to memory of 824 3300 ql4AI4lx.exe 82 PID 3300 wrote to memory of 824 3300 ql4AI4lx.exe 82 PID 824 wrote to memory of 876 824 PC1cQ4eU.exe 83 PID 824 wrote to memory of 876 824 PC1cQ4eU.exe 83 PID 824 wrote to memory of 876 824 PC1cQ4eU.exe 83 PID 876 wrote to memory of 2148 876 Hc5rb7Tq.exe 84 PID 876 wrote to memory of 2148 876 Hc5rb7Tq.exe 84 PID 876 wrote to memory of 2148 876 Hc5rb7Tq.exe 84 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 2148 wrote to memory of 4500 2148 1WH82Ow5.exe 85 PID 876 wrote to memory of 2216 876 Hc5rb7Tq.exe 86 PID 876 wrote to memory of 2216 876 Hc5rb7Tq.exe 86 PID 876 wrote to memory of 2216 876 Hc5rb7Tq.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe"C:\Users\Admin\AppData\Local\Temp\c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ql4AI4lx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ql4AI4lx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PC1cQ4eU.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PC1cQ4eU.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hc5rb7Tq.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Hc5rb7Tq.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1WH82Ow5.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1WH82Ow5.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2za053eb.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2za053eb.exe5⤵
- Executes dropped EXE
PID:2216
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50fd35865f2ff38ef0b2a7557783a6796
SHA19260d128ca06bc9de01d04e639a0f18742d6e5e1
SHA25653b1249e9d9afe8c9a6787f2d5c1a5eaebee6363f88c12becf24604881a2a8a0
SHA512421cf57b5c8d8a5d5f65b1a06d70f03529197e1e8075c9054133b393aba0ff889e79329823ae2cca2e151b0ceb2e91c0d4009f41abf3634339324b23c6017b05
-
Filesize
758KB
MD5822fc73dceef68450e63c8ffe3c7227d
SHA1a581ff6b0c412b981c40d8b159b0fe18c7c4c0a2
SHA256fb7b90b5efe166cd2ed9d64da672c47868db1d58888d322ed7f60dcbca0f3e00
SHA5124308a9434c6ef593e881f5e29c066095e42301c148546a325817b215bafd350cbc62f745ba94221a7bfa767c67055c38e22f235aa795c6ae7b75864ca3a821d9
-
Filesize
561KB
MD5fab733b539aa3c3ac0cddd441d7e8f37
SHA179cfc82ea52d2c4cc4cd64e1915c972649638ebc
SHA256ef58253f199184ed57dde0b38b4cf772b5c81eaa8c9736b36f03f9fa06c7d745
SHA512e85ea4acc23209df4ab0d2752e605417919779db685d4180ce474ab4ee71f0ec2f97f8f49c8c03cd144d3cccc723b4dc83405c52c8b7d64ec1aa211beb7896e9
-
Filesize
1.1MB
MD57e88670e893f284a13a2d88af7295317
SHA14bc0d76245e9d6ca8fe69daa23c46b2b8f770f1a
SHA256d5e9e8612572f4586bc94b4475503558b7c4cd9329d3ade5b86f45018957deb9
SHA51201541840ee2aa44de1f5f41bee31409560c481c10ed07d854239c0c9bdb648c86857a6a83a907e23f3b2865043b175689aa5f4f13fd0fd5f5444756b9ddfcdc2
-
Filesize
222KB
MD5d27718b2b8e3a68e34cdf5b8c5745c92
SHA13bcfe95420a8bb5f387ea2c4cd203f31880e9b82
SHA2560fffc640bb6d1d8077798e39c9685d3acdd62278c9c9df306eab4982d9ddb894
SHA5125ea1e77f86b2189895db6d33062ceb7adb7e39582281fe456ee806b8211a861364d3cbca641ebac3bc369d166ccded35ef6b8df6259bbd5366fcd5a6acd8b2ad