Overview
overview
10Static
static
31bd70f5afc...20.exe
windows10-2004-x64
1020d5ad811e...b7.exe
windows10-2004-x64
102ca6e4b470...97.exe
windows10-2004-x64
1030323f682e...18.exe
windows10-2004-x64
10426e1b8066...18.exe
windows10-2004-x64
1043ea4b5927...9e.exe
windows10-2004-x64
1044ba27c950...f2.exe
windows10-2004-x64
106e35231281...45.exe
windows10-2004-x64
107cac44d1ec...c4.exe
windows10-2004-x64
10823db2b88d...40.exe
windows10-2004-x64
10a884418225...db.exe
windows10-2004-x64
10c68d91a00f...d2.exe
windows10-2004-x64
10cabcad649e...d3.exe
windows7-x64
10cabcad649e...d3.exe
windows10-2004-x64
10cb4c64011d...ef.exe
windows10-2004-x64
10d55f431b8e...57.exe
windows10-2004-x64
10dea00ebf60...e0.exe
windows10-2004-x64
10e017c199a6...9b.exe
windows10-2004-x64
10e01acda385...7b.exe
windows10-2004-x64
10e46b62442d...14.exe
windows10-2004-x64
10ef7029b98b...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
1bd70f5afcc29724401d52710f012058d999560c75bde3fd609f66ffc0bd9720.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
20d5ad811e156e522c088718e9fad42c9719bbca8aa4b3f144c468550177d6b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2ca6e4b470413b98976384ac3e479028c30b8486b2ebb4a4dd8e4e2142faac97.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
30323f682e6a32aa6d849428448a5ebd9b9590ee3a331da4fd2f5934b4c13818.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
426e1b8066ed7b417a0887d9af5ab1436b8302f01a33910c8c64da68d5b06c18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
43ea4b5927abdf60c2312374034e3b21c33a1082d31190027a6b747b84aef49e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
44ba27c950b0c14f429cb6252215fa6bdf9cb6c714a1890cbaae75274f91f4f2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6e352312813a28290ff0ff1a92702c185aae40663ba027e0a0c2d464d283d345.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7cac44d1ecd3f5639f33ee135e671d1baab428e0ead20f5eae7b4d2be71debc4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
823db2b88de38daac96f8e746abe924341117f170be5cd8a57a2db86d001bc40.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
cabcad649e33f7f4e2ee71f0de68902c08004e3587dd364c97b12d067acbd6d3.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
cabcad649e33f7f4e2ee71f0de68902c08004e3587dd364c97b12d067acbd6d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
cb4c64011df6d9448d6e9f657a89d6cc8dfd2b81fc8262bccfab2f05465c39ef.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
dea00ebf6034d535aea8f56cd6017972814dfb3374887346a9c9c8182c1110e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e017c199a693aee53fef17402d6258dee359f1092c5845f73d404e2646590b9b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e01acda3856cc169ddd84def2f4c60a6487d82da3d3c35333bff09986229bd7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ef7029b98b2432c74d1512668109e659b6f7e89d2d4469a291c54309ecec0878.exe
Resource
win10v2004-20240508-en
General
-
Target
d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe
-
Size
1.0MB
-
MD5
ec3305d183846a3c92c07d0053b41f3b
-
SHA1
4ea345e1ba5c1076a422310d48b1682ca2dcd56d
-
SHA256
d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57
-
SHA512
270a856c6522f0f683c64590393b286b825bcc39a99585417a125b3525451aa43bc7c5f9c7735d8504defafbd801e5632628245422859718656c3ab496eca76d
-
SSDEEP
24576:KyP7XiJUqJaiZXcZA3g6NQ8QdfCZiGKN8b7GAoCgnL+eT:RzmEmsZAQ6O8QdfWiGFgn
Malware Config
Extracted
redline
grome
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral16/memory/984-25-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral16/memory/984-26-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral16/memory/984-28-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral16/memory/1748-37-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 1168 sh6qU78.exe 2160 Cu1rf31.exe 1196 1vF56wW4.exe 1568 2in5141.exe 2404 3dl21bJ.exe 1668 4zV625lJ.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Cu1rf31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sh6qU78.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1196 set thread context of 1780 1196 1vF56wW4.exe 86 PID 1568 set thread context of 984 1568 2in5141.exe 91 PID 1668 set thread context of 1748 1668 4zV625lJ.exe 98 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3dl21bJ.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3dl21bJ.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3dl21bJ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1780 AppLaunch.exe 1780 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 AppLaunch.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2588 wrote to memory of 1168 2588 d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe 83 PID 2588 wrote to memory of 1168 2588 d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe 83 PID 2588 wrote to memory of 1168 2588 d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe 83 PID 1168 wrote to memory of 2160 1168 sh6qU78.exe 84 PID 1168 wrote to memory of 2160 1168 sh6qU78.exe 84 PID 1168 wrote to memory of 2160 1168 sh6qU78.exe 84 PID 2160 wrote to memory of 1196 2160 Cu1rf31.exe 85 PID 2160 wrote to memory of 1196 2160 Cu1rf31.exe 85 PID 2160 wrote to memory of 1196 2160 Cu1rf31.exe 85 PID 1196 wrote to memory of 1780 1196 1vF56wW4.exe 86 PID 1196 wrote to memory of 1780 1196 1vF56wW4.exe 86 PID 1196 wrote to memory of 1780 1196 1vF56wW4.exe 86 PID 1196 wrote to memory of 1780 1196 1vF56wW4.exe 86 PID 1196 wrote to memory of 1780 1196 1vF56wW4.exe 86 PID 1196 wrote to memory of 1780 1196 1vF56wW4.exe 86 PID 1196 wrote to memory of 1780 1196 1vF56wW4.exe 86 PID 1196 wrote to memory of 1780 1196 1vF56wW4.exe 86 PID 2160 wrote to memory of 1568 2160 Cu1rf31.exe 87 PID 2160 wrote to memory of 1568 2160 Cu1rf31.exe 87 PID 2160 wrote to memory of 1568 2160 Cu1rf31.exe 87 PID 1568 wrote to memory of 600 1568 2in5141.exe 89 PID 1568 wrote to memory of 600 1568 2in5141.exe 89 PID 1568 wrote to memory of 600 1568 2in5141.exe 89 PID 1568 wrote to memory of 1096 1568 2in5141.exe 90 PID 1568 wrote to memory of 1096 1568 2in5141.exe 90 PID 1568 wrote to memory of 1096 1568 2in5141.exe 90 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1568 wrote to memory of 984 1568 2in5141.exe 91 PID 1168 wrote to memory of 2404 1168 sh6qU78.exe 92 PID 1168 wrote to memory of 2404 1168 sh6qU78.exe 92 PID 1168 wrote to memory of 2404 1168 sh6qU78.exe 92 PID 2588 wrote to memory of 1668 2588 d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe 93 PID 2588 wrote to memory of 1668 2588 d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe 93 PID 2588 wrote to memory of 1668 2588 d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe 93 PID 1668 wrote to memory of 4348 1668 4zV625lJ.exe 97 PID 1668 wrote to memory of 4348 1668 4zV625lJ.exe 97 PID 1668 wrote to memory of 4348 1668 4zV625lJ.exe 97 PID 1668 wrote to memory of 1748 1668 4zV625lJ.exe 98 PID 1668 wrote to memory of 1748 1668 4zV625lJ.exe 98 PID 1668 wrote to memory of 1748 1668 4zV625lJ.exe 98 PID 1668 wrote to memory of 1748 1668 4zV625lJ.exe 98 PID 1668 wrote to memory of 1748 1668 4zV625lJ.exe 98 PID 1668 wrote to memory of 1748 1668 4zV625lJ.exe 98 PID 1668 wrote to memory of 1748 1668 4zV625lJ.exe 98 PID 1668 wrote to memory of 1748 1668 4zV625lJ.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe"C:\Users\Admin\AppData\Local\Temp\d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sh6qU78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sh6qU78.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cu1rf31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Cu1rf31.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1vF56wW4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1vF56wW4.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2in5141.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2in5141.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3dl21bJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3dl21bJ.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4zV625lJ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4zV625lJ.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1748
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5839d6ee7929d77264cad929a1c458518
SHA1eda80d0179735f94a0a12dd695b1499358c79d52
SHA25658483db7aa73c1b600b8aada090c948c0aa9ab3eae95b11a2d1b39fc66adfbec
SHA512d5feee9229fc1c4a0c59cdcc9a528c10147337fdabd6a79253b652682cc8e962739c787aed4933d73b3c44fab9ef37a01f52bf1642868ce2b70b01e1b70d82ad
-
Filesize
648KB
MD513879bbd40c4c43549fe263871b5292c
SHA1a260939baca340eecbf2cac61cfe81f7cb352081
SHA25632f456a242d807cd3789b219f062f4a503f3474ab718e2254075a711b8bad5f1
SHA512dc17152db8d244eac433bd44e1146737fa7c533740d9b24cba23af61f7af33247d1215ae413bbfdf74f05324083cccb44012b32a64182d0d4e4eb198f6248e8b
-
Filesize
31KB
MD5669f7cda993046b9094aa5364da5e812
SHA10fb18910569664fc3885b45d5d972ff2670d8c51
SHA256b925b6e1452138e2afbb9423b7118bc57a598ce1f564b4fb074a8dd164c4973b
SHA512d461e14e8a2065066de86a0d6d31859b9398fcf9a8965df68fd079ec1840abb93b6aae80a6bfb3110dbdce1792f94faeccdafe0224b1d793925689fe526adca8
-
Filesize
523KB
MD5e135e0bf2d56e6f65c82289bf50206bc
SHA171573541076e78198b2afe5791fc45150a483f33
SHA2563340bbc2b32033ef7fa598c7115af46899fef83023238d6973588fed75590ba2
SHA512282188fef1b86339c9ee9cf327fe4941fff75afbc97b37f58e68ce988611d525ef4f25203215ea9bc454e3370ead16dcc4dd3c732772ea42e612950401400b98
-
Filesize
874KB
MD55ccae1462fd952afda3d907edba30087
SHA1b4bcf39ff81545eceefc583026d413c2d2874c86
SHA256d4b91e03d41777b39a4100d85d828d41bf86c16a9793b3118d13ca735cd5bbdf
SHA51249e985072053c3f674814b086df8697d729c8d61cee6e24d17bc2bcf9152ccaa4282460566c51c312d00b9eec28dedf7084c406958714a65cc03467c0dbc4823
-
Filesize
1.1MB
MD501644e62872c964b07669fee1dd4980c
SHA1e7dae02fc8cbb221102d8af9ebc4673f91a34151
SHA2562997783a760389f11f29ad5bcf91514efb0169a22db13a90b557737926991550
SHA51298aa5afd1b23f3d02bc3da9de465faba105bef913b51f9624017e0d73bf9201160d9b50ad1240360c902f2747f7d34f5bcdad423b578e5ba93b3dc8933da32c9