Overview
overview
10Static
static
306f1b755da...d3.exe
windows10-2004-x64
1014b33a31c1...19.exe
windows10-2004-x64
1016f3c19a7f...1a.exe
windows10-2004-x64
10192ce44be6...d3.exe
windows10-2004-x64
10208bd49be4...cf.exe
windows10-2004-x64
102ae8e0e720...19.exe
windows10-2004-x64
102b74e820a6...32.exe
windows10-2004-x64
10396631ba37...a0.exe
windows10-2004-x64
10777259b2de...25.exe
windows10-2004-x64
107f06170b1d...e6.exe
windows10-2004-x64
1080f9db3963...66.exe
windows10-2004-x64
108d2837f05f...42.exe
windows10-2004-x64
109a7ee6b801...e4.exe
windows10-2004-x64
109c8e4ed081...a3.exe
windows10-2004-x64
10a68c5e94f5...52.exe
windows10-2004-x64
10aaed2c62a2...28.exe
windows10-2004-x64
10e097574588...fe.exe
windows10-2004-x64
10e256d9f4b9...eb.exe
windows10-2004-x64
10f02caa1867...71.exe
windows10-2004-x64
10f7447a8c0b...af.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
06f1b755da951fcf461e1c619e531208a68c60a692e3a2869f7207254aaea1d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
208bd49be44846fa019a8a4b21da09b934676de6c05e6688624fa6608f3917cf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
777259b2de1e73f2f79c2edbd0a7a6b94de34bca7c3376f8e9aae8a4e44be025.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
80f9db396349ffd316d40f58b12121eb8671e0af591fa231cd1037ed80d55c66.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
9a7ee6b801d877ebe30af54c64afce444a041f28ac9cb08964f0d97a0fa17fe4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9c8e4ed08188524a9beb39dfd35cc3c50ed0a6344464afcdff53746ddccee6a3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a68c5e94f561ee7f4e5edc6e64db2ccc6083a9a34acd478da0b5a3003a233e52.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e0975745886991171c59c0c9a7b781238f54c7dbc7be68e29315487b94f3cafe.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e256d9f4b9031db67a2e5cd1574fceafc35d62734d1079c433dd19867ee9c3eb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f02caa18679b8af0e356c5ecf5b840b3c4f001b4c623c0cf33686d9cf4111871.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f7447a8c0bbf4733ba4bef9129e0bcb98bcfe4fd1b57d2ec4e9349b333329aaf.exe
Resource
win10v2004-20240508-en
General
-
Target
2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe
-
Size
1.3MB
-
MD5
5fd4292227679641bd077b5860cc1b20
-
SHA1
6d16d9ed9789439a53edcb08fc29c94dc333ddec
-
SHA256
2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32
-
SHA512
18a29392c34b6cf2efec0cd7c8fe3d1c46ef140eee726ec2a6bcc78cdabbce19b7ba74d434e1bfed37acc40ad1e91146ad56a011dc670bf696469dc8723021f8
-
SSDEEP
24576:nyuoJKNzEOwgX1dtUiF7y3rnffcn+CnHREo6MsW:yuxwgWKy3rffcnlLT
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral7/memory/4556-28-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral7/memory/4556-30-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral7/memory/4556-32-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x0007000000023462-33.dat family_redline behavioral7/memory/4136-35-0x0000000000C40000-0x0000000000C7E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 624 uh4rV1qT.exe 744 Ve2OH5Tx.exe 1100 jd4Sg0gI.exe 3984 1fW61iv0.exe 4136 2YL576Rf.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" uh4rV1qT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ve2OH5Tx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" jd4Sg0gI.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3984 set thread context of 4556 3984 1fW61iv0.exe 90 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3092 wrote to memory of 624 3092 2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe 83 PID 3092 wrote to memory of 624 3092 2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe 83 PID 3092 wrote to memory of 624 3092 2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe 83 PID 624 wrote to memory of 744 624 uh4rV1qT.exe 84 PID 624 wrote to memory of 744 624 uh4rV1qT.exe 84 PID 624 wrote to memory of 744 624 uh4rV1qT.exe 84 PID 744 wrote to memory of 1100 744 Ve2OH5Tx.exe 85 PID 744 wrote to memory of 1100 744 Ve2OH5Tx.exe 85 PID 744 wrote to memory of 1100 744 Ve2OH5Tx.exe 85 PID 1100 wrote to memory of 3984 1100 jd4Sg0gI.exe 86 PID 1100 wrote to memory of 3984 1100 jd4Sg0gI.exe 86 PID 1100 wrote to memory of 3984 1100 jd4Sg0gI.exe 86 PID 3984 wrote to memory of 4864 3984 1fW61iv0.exe 89 PID 3984 wrote to memory of 4864 3984 1fW61iv0.exe 89 PID 3984 wrote to memory of 4864 3984 1fW61iv0.exe 89 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 3984 wrote to memory of 4556 3984 1fW61iv0.exe 90 PID 1100 wrote to memory of 4136 1100 jd4Sg0gI.exe 92 PID 1100 wrote to memory of 4136 1100 jd4Sg0gI.exe 92 PID 1100 wrote to memory of 4136 1100 jd4Sg0gI.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe"C:\Users\Admin\AppData\Local\Temp\2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uh4rV1qT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uh4rV1qT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ve2OH5Tx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ve2OH5Tx.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jd4Sg0gI.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jd4Sg0gI.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1fW61iv0.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1fW61iv0.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4864
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2YL576Rf.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2YL576Rf.exe5⤵
- Executes dropped EXE
PID:4136
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51d33cc7609f50018e430042ea4cc87ee
SHA1bb93fd0194e4115fc9161d0858797f1a815d3712
SHA25664a523cf9fe8d787427c9327b8511cbeb9ebee47870a542c2105ce09b42b6cd4
SHA51240589d27b5afa341f3a94373e09f2cf2317c3a8a9181c9ec2ad071e955aa962a1f03c9af30999957693b769ff1ec92af86d6c0416ad78d5b219263bc42abd0d3
-
Filesize
761KB
MD58228d2ba5624d8f6a6b58ce79f3f9055
SHA1e68f3762a51f303fbc9b6c5aa1bc6261baa920a1
SHA2563dc9c0f23ea25df9bd1eedae5f9468c962c355bd5dfbe921c81c61517eaf8be6
SHA512866a7347765b63fb6039dce9a54ef8d321cb7355db922734bf03c7881177a4f971ca68db1ae6fd0ba58c85829146cb67cac153b5016d2c2f4890751199ebbf48
-
Filesize
565KB
MD509cd7f113fac6343927a2742ca938a95
SHA19f6349efe4257d5991919fa87b8fd275f9f8d3e4
SHA2560786c7c85047b6a0ed4803ca25de9afc92a869438b2c73a85bcf77e66bee5a27
SHA5128681aa6163809d8b8c31da9d6b3b857857a33afd9ea3d08fc727562b145176115a8095c5f29e47c24a99ecf5e6085377292bd9c8b2cd630e4d4a736d7b4aa605
-
Filesize
1.1MB
MD569c71d45f13e1a096ca26926c7181c6f
SHA1c868ce38355ba22b46fefc6e7240a675efff97e7
SHA2565f4e55e97fabbc5b675b4cdea2dae74832afe6590c36e19d40ef6b0a20a385c8
SHA512cf7f3278837d007de125209d8945fd1871ee4708b31f669bde553db9a9f11826f25c4ae98143da1ad5816a928948f671f2cfa9a59a3bc68494ead4dedf6a2d4f
-
Filesize
222KB
MD5a153557c89c6703b2a5a19c38b25aa35
SHA13ce93aed76490c42c91a5bc83b8d94fe918b7729
SHA2569a00772644aa54ed1e8971d18831a6418efdab651091198176662cb66e4999e7
SHA512029214ccaa772b7a3a50b20a66ab83e1a7698a3bb30b28f7fcd5cd3691b0ba503eb00cd882080945c39cb2fde598318a2cd75c322eb65fd8af8f24748200c349