Overview
overview
10Static
static
306f1b755da...d3.exe
windows10-2004-x64
1014b33a31c1...19.exe
windows10-2004-x64
1016f3c19a7f...1a.exe
windows10-2004-x64
10192ce44be6...d3.exe
windows10-2004-x64
10208bd49be4...cf.exe
windows10-2004-x64
102ae8e0e720...19.exe
windows10-2004-x64
102b74e820a6...32.exe
windows10-2004-x64
10396631ba37...a0.exe
windows10-2004-x64
10777259b2de...25.exe
windows10-2004-x64
107f06170b1d...e6.exe
windows10-2004-x64
1080f9db3963...66.exe
windows10-2004-x64
108d2837f05f...42.exe
windows10-2004-x64
109a7ee6b801...e4.exe
windows10-2004-x64
109c8e4ed081...a3.exe
windows10-2004-x64
10a68c5e94f5...52.exe
windows10-2004-x64
10aaed2c62a2...28.exe
windows10-2004-x64
10e097574588...fe.exe
windows10-2004-x64
10e256d9f4b9...eb.exe
windows10-2004-x64
10f02caa1867...71.exe
windows10-2004-x64
10f7447a8c0b...af.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
06f1b755da951fcf461e1c619e531208a68c60a692e3a2869f7207254aaea1d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
208bd49be44846fa019a8a4b21da09b934676de6c05e6688624fa6608f3917cf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
777259b2de1e73f2f79c2edbd0a7a6b94de34bca7c3376f8e9aae8a4e44be025.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
80f9db396349ffd316d40f58b12121eb8671e0af591fa231cd1037ed80d55c66.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
9a7ee6b801d877ebe30af54c64afce444a041f28ac9cb08964f0d97a0fa17fe4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9c8e4ed08188524a9beb39dfd35cc3c50ed0a6344464afcdff53746ddccee6a3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a68c5e94f561ee7f4e5edc6e64db2ccc6083a9a34acd478da0b5a3003a233e52.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e0975745886991171c59c0c9a7b781238f54c7dbc7be68e29315487b94f3cafe.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e256d9f4b9031db67a2e5cd1574fceafc35d62734d1079c433dd19867ee9c3eb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f02caa18679b8af0e356c5ecf5b840b3c4f001b4c623c0cf33686d9cf4111871.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f7447a8c0bbf4733ba4bef9129e0bcb98bcfe4fd1b57d2ec4e9349b333329aaf.exe
Resource
win10v2004-20240508-en
General
-
Target
aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe
-
Size
1.5MB
-
MD5
039c520ad29f179727d52fd7bb41ddc9
-
SHA1
68e44ea4487f50fa6c97b3aa739bf3c2bb15e2f5
-
SHA256
aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28
-
SHA512
e22e81f49b448e7d18f7bfdb3b13688020b279a6fb39db44238e2f695f90dab9f3b9af6409fc80f8a799537f330af753abc8e3548baad183ce24d7a61e74f0e8
-
SSDEEP
24576:Vy8nyYj4q3Y6M2GWyMu86ZD4SBFL/gfzWHbawDN67vluQaU8t0EOU2luc4kFO6i:w8ny24qNtyMuF4iSqHb/YPaavUcP4KO6
Malware Config
Extracted
redline
kedru
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral16/memory/3740-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/3740-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/3740-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral16/files/0x0007000000023454-40.dat family_redline behavioral16/memory/5032-42-0x0000000000B80000-0x0000000000BBC000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1704 Ws0dl5dd.exe 2120 Xy8Jr5cs.exe 4864 IX4iK9bU.exe 3628 jq7aD3uW.exe 1872 1uz88rO8.exe 5032 2qr874YG.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ws0dl5dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Xy8Jr5cs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" IX4iK9bU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" jq7aD3uW.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1872 set thread context of 3740 1872 1uz88rO8.exe 91 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1704 1772 aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe 83 PID 1772 wrote to memory of 1704 1772 aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe 83 PID 1772 wrote to memory of 1704 1772 aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe 83 PID 1704 wrote to memory of 2120 1704 Ws0dl5dd.exe 84 PID 1704 wrote to memory of 2120 1704 Ws0dl5dd.exe 84 PID 1704 wrote to memory of 2120 1704 Ws0dl5dd.exe 84 PID 2120 wrote to memory of 4864 2120 Xy8Jr5cs.exe 87 PID 2120 wrote to memory of 4864 2120 Xy8Jr5cs.exe 87 PID 2120 wrote to memory of 4864 2120 Xy8Jr5cs.exe 87 PID 4864 wrote to memory of 3628 4864 IX4iK9bU.exe 89 PID 4864 wrote to memory of 3628 4864 IX4iK9bU.exe 89 PID 4864 wrote to memory of 3628 4864 IX4iK9bU.exe 89 PID 3628 wrote to memory of 1872 3628 jq7aD3uW.exe 90 PID 3628 wrote to memory of 1872 3628 jq7aD3uW.exe 90 PID 3628 wrote to memory of 1872 3628 jq7aD3uW.exe 90 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 1872 wrote to memory of 3740 1872 1uz88rO8.exe 91 PID 3628 wrote to memory of 5032 3628 jq7aD3uW.exe 92 PID 3628 wrote to memory of 5032 3628 jq7aD3uW.exe 92 PID 3628 wrote to memory of 5032 3628 jq7aD3uW.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe"C:\Users\Admin\AppData\Local\Temp\aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ws0dl5dd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ws0dl5dd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Xy8Jr5cs.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Xy8Jr5cs.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IX4iK9bU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IX4iK9bU.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jq7aD3uW.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jq7aD3uW.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1uz88rO8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1uz88rO8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2qr874YG.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2qr874YG.exe6⤵
- Executes dropped EXE
PID:5032
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD562720902f665d57ce90d75ec43de2627
SHA17d23c3e8b31665411699a3f9571ca347a5b83f2e
SHA25618bade8402b5bb5f07c942d9ce180161ca5c3215c98493a8251059ff17312362
SHA512e1668520fc7aee97304b954bbae9b3aed1a8a0c25117b799cc91943ad8b99aa19df6fc2abb9234530759ef23fd10c2c5ef29ba88439c3aa951a9b603e6cf1338
-
Filesize
1.2MB
MD5b88f7b9bc84f8b58fd32e07fc20d7c13
SHA1c4105691e3d31c9157001fcd9905d5d64b46b6df
SHA256c2a00704091708efa5fc098e3fe3490b805056a209769105ac8669d1eec11588
SHA512b743b2fdfb3db0964c68824bfa5707bcb8c6e8d4190aa002f2fd273d49fc26d237f913a8acdcecdeb28ddeb544d15ccac779ce3b63445c76d29320f5a0434364
-
Filesize
765KB
MD5d1e00977c3b90892de2d2b2687f41460
SHA144b82a0a560b60c069bd07cd6fd3ad6e8348c9ce
SHA25615041e924d82e47d490dc2d54240460649f90e6de7b12cca1061f20ace6c9c8a
SHA512baddce7b19e0f917ab1223bfc7654c850bbb96f1459dad63d5efd70e39f966fc2677a3b6c03d4a5e97786b6fd9e27f41281c2be66864536f33add26f566e43e9
-
Filesize
569KB
MD5cb4b77a00ff06f41d25e7014cba3a5bf
SHA1a49a1bc6c58b8f113ebd0063e6004da03943974f
SHA256d4e744ccb61cef2968b130523c284eb14a608c651d2dd6770df697e630af1a53
SHA512739a1fbd622cfedbe1a80d2a34559a7086c7fd67b6ee8bd3bfa6864e6cc7d2341d1bc2cf5193d82acb953b1e7bf1b7406b6eeba185911ef2118441f1414d8ae3
-
Filesize
1.1MB
MD5992b95942128e576f092bfc689f2bc07
SHA104751682f383cb40c1d1cf37f2d440b5b6ddf5b7
SHA25644901b76fe126f154ad8839e833159fea65f5de8cf79c4918cc9d8136f57354a
SHA5121de12546b1e3b0d3ede12b3d98023ed1e1e20e87968cf517a5bb2df304fc9d76b056c543c3c770fa30234030906b677a30cb4ad289703438c161d058ba49cc71
-
Filesize
219KB
MD5c03c2b5def3992c4f734b9057e0d4d29
SHA143ef969756575bb2ba2f37f12fa94fb7fddbd984
SHA25602f562695fd48dd3d50bbb0e6c8ac0ebf17b72d18f11189147a350b0262e5270
SHA512c62f7d77aef22e94c5bfa40c92d2cc1c2d83855f8bdbd52814eb931449e07cd406ac7562a86933c8be08d177e7dcfda5c8906f9927a4893592ecf475dc71aa88