Overview
overview
10Static
static
3169827445a...fd.exe
windows10-2004-x64
102c5911fd0a...9f.exe
windows10-2004-x64
103d26ff1c7f...6f.exe
windows10-2004-x64
104316c9cb7f...d5.exe
windows10-2004-x64
10453554affb...f6.exe
windows10-2004-x64
104be48036db...87.exe
windows10-2004-x64
106843058b07...7b.exe
windows10-2004-x64
106ab7739b7f...d6.exe
windows10-2004-x64
10741b5d1728...11.exe
windows10-2004-x64
107dbaeca4ac...3f.exe
windows7-x64
107dbaeca4ac...3f.exe
windows10-2004-x64
10889f2baa64...76.exe
windows10-2004-x64
1092288ddafe...85.exe
windows10-2004-x64
109697ffb24d...50.exe
windows10-2004-x64
10abd0fa453e...b8.exe
windows10-2004-x64
10b28f0b1322...38.exe
windows10-2004-x64
10d89a055085...df.exe
windows10-2004-x64
10db77a8c068...dc.exe
windows7-x64
10db77a8c068...dc.exe
windows10-2004-x64
10e00e311d45...53.exe
windows10-2004-x64
10e0990290e3...28.exe
windows10-2004-x64
10fedbb32d49...4c.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:56
Static task
static1
Behavioral task
behavioral1
Sample
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
3d26ff1c7f2a98b2c2c03ddc43bd17ad629931d425986a46cb7ba3ef54b1ba6f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4316c9cb7f9e1a073313300df45a90e9457dec01ec27e4f7c9725091247276d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
453554affb4477ef1397310265a6a90ae0953e5bca58d9b7b98e7323e7cccdf6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ab7739b7f0b5cc84bf55cd6f09beb3d4860ec6428202c54e8e023161020c8d6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
741b5d17281b7e19ee8dd529a91b547c0bdf8938c84539f745ec882d49373311.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
889f2baa640211bf12947cfab6157ff93a774d0b4ed9568df0eb65952cedf576.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
9697ffb24dfe38f4a40e3cf91464543c6f5a47170c56b58a949e1a93ab9df050.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
abd0fa453ed59d06e5c3d6cbafe873f404a47cab8f3c4bcd545fdfa7491ff4b8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b28f0b13221fc5aaa297029cc7c28a22c5b5dfe8aa6626036342ae0b862d8838.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e00e311d4566f8b67392f945545d0e1ea579af2fa76c416042196eea3ca75753.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e0990290e38dc94b3c6a8bd8d028c230706f11717bdc17beb40d9a73dcfb2628.exe
Resource
win10v2004-20240426-en
General
-
Target
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe
-
Size
1.1MB
-
MD5
fb7f64bb0a4554798853318043392040
-
SHA1
4c81df15636106a1cedc43f0435443c9b1547f2e
-
SHA256
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd
-
SHA512
56028f73d5d98c0915462996be04b5a7ebdffbbb7188618e2ec2825ebe0b95cfa1b1fc36192b0ca6af9a60b15e285d515c4c91398d0e5bd45241c7d3ff41cbe0
-
SSDEEP
24576:cy1c2oUIaB6nHyAA91U3UyIXZdYnVFrNcnoKfaxBS1SAE:L1mUpDt92nlqnLynSUA
Malware Config
Extracted
redline
supera
77.91.124.82:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2wt1255.exe mystic_family -
Processes:
1Vq68aN7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1Vq68aN7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1Vq68aN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1Vq68aN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1Vq68aN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1Vq68aN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1Vq68aN7.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4556-33-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
Processes:
up5fE40.exezT5Uk80.exe1Vq68aN7.exe2wt1255.exe3te52BN.exe4Jo121AH.exepid process 5020 up5fE40.exe 3880 zT5Uk80.exe 3232 1Vq68aN7.exe 4540 2wt1255.exe 4048 3te52BN.exe 3120 4Jo121AH.exe -
Processes:
1Vq68aN7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1Vq68aN7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1Vq68aN7.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exeup5fE40.exezT5Uk80.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" up5fE40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zT5Uk80.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3te52BN.exe4Jo121AH.exedescription pid process target process PID 4048 set thread context of 3792 4048 3te52BN.exe AppLaunch.exe PID 3120 set thread context of 4556 3120 4Jo121AH.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1Vq68aN7.exepid process 3232 1Vq68aN7.exe 3232 1Vq68aN7.exe 3232 1Vq68aN7.exe 3232 1Vq68aN7.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exeup5fE40.exezT5Uk80.execmd.exe3te52BN.exe4Jo121AH.exedescription pid process target process PID 4264 wrote to memory of 5020 4264 169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe up5fE40.exe PID 4264 wrote to memory of 5020 4264 169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe up5fE40.exe PID 4264 wrote to memory of 5020 4264 169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe up5fE40.exe PID 5020 wrote to memory of 3880 5020 up5fE40.exe zT5Uk80.exe PID 5020 wrote to memory of 3880 5020 up5fE40.exe zT5Uk80.exe PID 5020 wrote to memory of 3880 5020 up5fE40.exe zT5Uk80.exe PID 3880 wrote to memory of 3232 3880 zT5Uk80.exe 1Vq68aN7.exe PID 3880 wrote to memory of 3232 3880 zT5Uk80.exe 1Vq68aN7.exe PID 4020 wrote to memory of 3392 4020 cmd.exe regini.exe PID 4020 wrote to memory of 3392 4020 cmd.exe regini.exe PID 3880 wrote to memory of 4540 3880 zT5Uk80.exe 2wt1255.exe PID 3880 wrote to memory of 4540 3880 zT5Uk80.exe 2wt1255.exe PID 3880 wrote to memory of 4540 3880 zT5Uk80.exe 2wt1255.exe PID 5020 wrote to memory of 4048 5020 up5fE40.exe 3te52BN.exe PID 5020 wrote to memory of 4048 5020 up5fE40.exe 3te52BN.exe PID 5020 wrote to memory of 4048 5020 up5fE40.exe 3te52BN.exe PID 4048 wrote to memory of 3792 4048 3te52BN.exe AppLaunch.exe PID 4048 wrote to memory of 3792 4048 3te52BN.exe AppLaunch.exe PID 4048 wrote to memory of 3792 4048 3te52BN.exe AppLaunch.exe PID 4048 wrote to memory of 3792 4048 3te52BN.exe AppLaunch.exe PID 4048 wrote to memory of 3792 4048 3te52BN.exe AppLaunch.exe PID 4048 wrote to memory of 3792 4048 3te52BN.exe AppLaunch.exe PID 4264 wrote to memory of 3120 4264 169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe 4Jo121AH.exe PID 4264 wrote to memory of 3120 4264 169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe 4Jo121AH.exe PID 4264 wrote to memory of 3120 4264 169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe 4Jo121AH.exe PID 3120 wrote to memory of 4556 3120 4Jo121AH.exe AppLaunch.exe PID 3120 wrote to memory of 4556 3120 4Jo121AH.exe AppLaunch.exe PID 3120 wrote to memory of 4556 3120 4Jo121AH.exe AppLaunch.exe PID 3120 wrote to memory of 4556 3120 4Jo121AH.exe AppLaunch.exe PID 3120 wrote to memory of 4556 3120 4Jo121AH.exe AppLaunch.exe PID 3120 wrote to memory of 4556 3120 4Jo121AH.exe AppLaunch.exe PID 3120 wrote to memory of 4556 3120 4Jo121AH.exe AppLaunch.exe PID 3120 wrote to memory of 4556 3120 4Jo121AH.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe"C:\Users\Admin\AppData\Local\Temp\169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\up5fE40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\up5fE40.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zT5Uk80.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zT5Uk80.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Vq68aN7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Vq68aN7.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2wt1255.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2wt1255.exe4⤵
- Executes dropped EXE
PID:4540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3te52BN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3te52BN.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:3792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Jo121AH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Jo121AH.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c regini "C:\Users\Admin\AppData\Roaming\random_1716458224.txt"1⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\system32\regini.exeregini "C:\Users\Admin\AppData\Roaming\random_1716458224.txt"2⤵PID:3392
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD546dbd580227b00765a18083aac46e470
SHA1761b97f5a0daf6438840605e9fb16abca730029e
SHA2567c74641c93f629a64652756f6fbd9509213278726bac411df8689a2f9320fbc1
SHA5126849d9ddad41e15d2d00f41e5c33311aefe595530d6b589bdf6e651eb951ba607fc55a542911d398ecccf5776f80e30a86a3c61e4e84a03260b9abd829553907
-
Filesize
721KB
MD552ce68206fcd51e63b2ff30b17232f89
SHA1f11db1add6e13ede917136f0bf243a30ac1b38c0
SHA256941b66b9da7df14bc4991425e7d102f824dd260a7f81a2dc7c8fec90c5c4802d
SHA51261452be125be4e8f28f0c7260612fe787be847456769a25cb4ee41412275866be15dfe724a95f47d6f35a76f8beb4c9446c27e23724a5813ef830820fd8ecd2f
-
Filesize
916KB
MD5ce47a3b4899f1b2fd44fcf4d180e95eb
SHA1f0883be11201f037f84ce0e6f6a22b57619029fd
SHA256c89bc9c2b39a93064315a5bf21a71d1cd4a65fe02b0a8c5857aedc904af1f54c
SHA512ecdb570b261091cc56fa4090654940dba0b8cf748b043651711c9aa002acbf6574d4f8e0ec94405bf29658cde37f6d750ef093c64bea2ba4e15dc99cc93b2422
-
Filesize
354KB
MD57d78a2ce92215276949f3b902c8818fa
SHA10fb9767a9195a5aa4b5a9b35b05dfb88632387f9
SHA256fd47d692a2a088780068a896ac93cd1f8c800178a221316df09576c70c0b8bab
SHA512504391f8d402ef86dc61d8acc07a4004574c098f05076e67b9f35e1628a04155e5514e41e868ecd3b83830e3e387076605118e516df0d6c7a3351ae3ba296486
-
Filesize
265KB
MD515fe972bcfd9189d826083838645b850
SHA1d2bf7fee68e358fa71b942b8ae92e483536abf86
SHA256ec739f26f487bcc65718bb8c28a5e3adf817a18e01952bd888f618a57c1e61d4
SHA51230f7c8daa78ba9bb32d5dca56440fd9b1d36336f496521920ab41737787c1c8e0bcdd714b72249e0ab52908d7918afcaf9e0b3f5ba2a8a2888e9adb538810cfe
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9
-
Filesize
78B
MD52d245696c73134b0a9a2ac296ea7c170
SHA1f234419d7a09920a46ad291b98d7dca5a11f0da8
SHA256ed83e1f6850e48029654e9829cbf6e2cdff82f55f61d1449f822e448f75e8930
SHA512af0b981ef20aa94aff080fbd2030556fe47c4cc563885b162e604f72bc70c4a0eee4ee57ce4ea8964e6363a32ba34f8bee933db30d3d61392c42299621a4fc79