Overview
overview
10Static
static
3169827445a...fd.exe
windows10-2004-x64
102c5911fd0a...9f.exe
windows10-2004-x64
103d26ff1c7f...6f.exe
windows10-2004-x64
104316c9cb7f...d5.exe
windows10-2004-x64
10453554affb...f6.exe
windows10-2004-x64
104be48036db...87.exe
windows10-2004-x64
106843058b07...7b.exe
windows10-2004-x64
106ab7739b7f...d6.exe
windows10-2004-x64
10741b5d1728...11.exe
windows10-2004-x64
107dbaeca4ac...3f.exe
windows7-x64
107dbaeca4ac...3f.exe
windows10-2004-x64
10889f2baa64...76.exe
windows10-2004-x64
1092288ddafe...85.exe
windows10-2004-x64
109697ffb24d...50.exe
windows10-2004-x64
10abd0fa453e...b8.exe
windows10-2004-x64
10b28f0b1322...38.exe
windows10-2004-x64
10d89a055085...df.exe
windows10-2004-x64
10db77a8c068...dc.exe
windows7-x64
10db77a8c068...dc.exe
windows10-2004-x64
10e00e311d45...53.exe
windows10-2004-x64
10e0990290e3...28.exe
windows10-2004-x64
10fedbb32d49...4c.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:56
Static task
static1
Behavioral task
behavioral1
Sample
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
3d26ff1c7f2a98b2c2c03ddc43bd17ad629931d425986a46cb7ba3ef54b1ba6f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4316c9cb7f9e1a073313300df45a90e9457dec01ec27e4f7c9725091247276d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
453554affb4477ef1397310265a6a90ae0953e5bca58d9b7b98e7323e7cccdf6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ab7739b7f0b5cc84bf55cd6f09beb3d4860ec6428202c54e8e023161020c8d6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
741b5d17281b7e19ee8dd529a91b547c0bdf8938c84539f745ec882d49373311.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
889f2baa640211bf12947cfab6157ff93a774d0b4ed9568df0eb65952cedf576.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
9697ffb24dfe38f4a40e3cf91464543c6f5a47170c56b58a949e1a93ab9df050.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
abd0fa453ed59d06e5c3d6cbafe873f404a47cab8f3c4bcd545fdfa7491ff4b8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b28f0b13221fc5aaa297029cc7c28a22c5b5dfe8aa6626036342ae0b862d8838.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e00e311d4566f8b67392f945545d0e1ea579af2fa76c416042196eea3ca75753.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e0990290e38dc94b3c6a8bd8d028c230706f11717bdc17beb40d9a73dcfb2628.exe
Resource
win10v2004-20240426-en
General
-
Target
2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe
-
Size
1.5MB
-
MD5
b61170f2b227f99ed0257b938906f686
-
SHA1
f6a839a52f0af527b1ae2a4b37946941b18da532
-
SHA256
2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f
-
SHA512
97ba944bc336d05f72362828c87f6101ffd639d8edf47d52e94648396a5075b771dfd46bdfc5347a911460647d4d10eb91032d848374e21b53341a1f1ad86c94
-
SSDEEP
24576:Ey0Xn/cq0cXV5RSiGOQqZFoZiQVrRmG47oeQBVx6WolM2y32bRu9MzkWfB0yxNlV:T0UwXVuHOvmRr48eQV6Woy52bR0ikgXN
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral2/memory/2720-35-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/2720-36-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/2720-38-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000233ee-41.dat family_redline behavioral2/memory/752-42-0x0000000000CC0000-0x0000000000CFE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4600 rb1iO5dt.exe 3940 az8gH1bQ.exe 4924 hv1Zo4YT.exe 2556 DB4Dh1xd.exe 2856 1Ql97iH7.exe 752 2WD944JN.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" rb1iO5dt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" az8gH1bQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hv1Zo4YT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" DB4Dh1xd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2856 set thread context of 2720 2856 1Ql97iH7.exe 87 -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4600 3796 2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe 81 PID 3796 wrote to memory of 4600 3796 2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe 81 PID 3796 wrote to memory of 4600 3796 2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe 81 PID 4600 wrote to memory of 3940 4600 rb1iO5dt.exe 82 PID 4600 wrote to memory of 3940 4600 rb1iO5dt.exe 82 PID 4600 wrote to memory of 3940 4600 rb1iO5dt.exe 82 PID 3940 wrote to memory of 4924 3940 az8gH1bQ.exe 83 PID 3940 wrote to memory of 4924 3940 az8gH1bQ.exe 83 PID 3940 wrote to memory of 4924 3940 az8gH1bQ.exe 83 PID 4924 wrote to memory of 2556 4924 hv1Zo4YT.exe 84 PID 4924 wrote to memory of 2556 4924 hv1Zo4YT.exe 84 PID 4924 wrote to memory of 2556 4924 hv1Zo4YT.exe 84 PID 2556 wrote to memory of 2856 2556 DB4Dh1xd.exe 85 PID 2556 wrote to memory of 2856 2556 DB4Dh1xd.exe 85 PID 2556 wrote to memory of 2856 2556 DB4Dh1xd.exe 85 PID 2856 wrote to memory of 908 2856 1Ql97iH7.exe 86 PID 2856 wrote to memory of 908 2856 1Ql97iH7.exe 86 PID 2856 wrote to memory of 908 2856 1Ql97iH7.exe 86 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2856 wrote to memory of 2720 2856 1Ql97iH7.exe 87 PID 2556 wrote to memory of 752 2556 DB4Dh1xd.exe 88 PID 2556 wrote to memory of 752 2556 DB4Dh1xd.exe 88 PID 2556 wrote to memory of 752 2556 DB4Dh1xd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe"C:\Users\Admin\AppData\Local\Temp\2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rb1iO5dt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rb1iO5dt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\az8gH1bQ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\az8gH1bQ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hv1Zo4YT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hv1Zo4YT.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\DB4Dh1xd.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\DB4Dh1xd.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ql97iH7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ql97iH7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2WD944JN.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2WD944JN.exe6⤵
- Executes dropped EXE
PID:752
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53f4ca944008c4dcff46b5b997bb8a800
SHA19006ff43730ce592201644b01c511dab93c61e15
SHA2566a3545cda45590fc91fec8603a3aac56b54d479cac9a6e087c42f91c570281c8
SHA512e182896ae69ededa51f8d648e382fe6d1d760df0409c7d25704628f2789b93204a4c92e803403b8c0c5acf3f85ac6cae39714b320c8e325676a1193d4c28191c
-
Filesize
1.2MB
MD5f92e5e996f83e79374e278abadaa2c1a
SHA1f3aaed4da0cd83acd9f9e886bd31752bab556455
SHA25648e846285e801d49dd5d05f47221081d435a06c56c6589fe17eeac5717d719b2
SHA512928c80c6f4c13dda769e1bc3ad9907f9aec00680982c10797c46a6d4430350c8e1b88ed50b5bda149196c18bfffa542039c14e6fc4673cda63aaa02b6342cead
-
Filesize
762KB
MD5f88e3b791b17673243e1facd2c102508
SHA173e10c001843daf0871db5aba867d82b11d659c5
SHA256150afc37eb14278d713b519bde711660f055deddf2d15da2426809b93afa6911
SHA512d2817b3c1418088636b282b50989cc8f969e48d900fea9e4eb939b78648e02be22783b4d04ac479447137a779f0ae84249c31887059bb1e40c8932ecda215269
-
Filesize
566KB
MD57fd6f9c72b2211a3179e68770a4364b8
SHA19f28f9f3009ca6d4882d6ea90a3f8412d7834aee
SHA256b7cf97a41fc7ff3993a960bdb59bc68323c4991f67ec99fa6c26e527856df4e0
SHA512b0e40ab2c016cb10618ed07588d0aadd57c29dcadcad4c6d323e6bc61c38a4596d78713ac64284f1aab301e38d1d022a64d1f7977e1ee5a54689bddf505c591d
-
Filesize
1.1MB
MD5a118fd63dea8b22dd475f652caf621c5
SHA15b52fd31b5ba0dfb104f8dd63c94f94a8b41b61c
SHA2561bf5cec3c254448c4c70558dc424e41f1c52255d582ac0aabb0a64c028cddf9a
SHA5124661862d7b6d82fc53fd1016b384a402d49eed6e72e200a10346d63cf34c979c5a2da303f2befba7cf31ebbaea08c693a9d30af27dd3d6b1bd2a04e4a7a1f156
-
Filesize
221KB
MD5f5549b39fbbdb4b0f3f642ef38983ee5
SHA1259544067b74db1f8cb08a3c8b3413b3c3861f36
SHA2568ed359cdd6330f9b84400f9ca839b074ac2a4af2d6839a942cbaf295f24076d8
SHA512eb10566a644ea029fa51f72f528475847c72b9e564857e98c065c792fa6f6d31c21ada77e0f360117e78d23198093824119f984f99c072f77debda2f04edeb95