Overview
overview
10Static
static
30bbde9df88...20.exe
windows10-2004-x64
1014381f89f8...62.exe
windows10-2004-x64
101c09c6faad...a0.exe
windows7-x64
31c09c6faad...a0.exe
windows10-2004-x64
101c8308039a...16.exe
windows7-x64
31c8308039a...16.exe
windows10-2004-x64
101fe4c883d2...6d.exe
windows10-2004-x64
10234b8aa959...d8.exe
windows10-2004-x64
10410e72302d...e8.exe
windows7-x64
3410e72302d...e8.exe
windows10-2004-x64
104431aa7413...8c.exe
windows7-x64
34431aa7413...8c.exe
windows10-2004-x64
1068f997d58c...e5.exe
windows10-2004-x64
10812ce70322...27.exe
windows10-2004-x64
1088a3f8285d...ab.exe
windows10-2004-x64
1090fdeaf3f0...a8.exe
windows7-x64
390fdeaf3f0...a8.exe
windows10-2004-x64
109d92aedf9d...9d.exe
windows7-x64
39d92aedf9d...9d.exe
windows10-2004-x64
109ff2fb6bb8...32.exe
windows10-2004-x64
10ac4e2e3d9d...dd.exe
windows7-x64
3ac4e2e3d9d...dd.exe
windows10-2004-x64
10b62483116d...b6.exe
windows10-2004-x64
10c901122f00...70.exe
windows10-2004-x64
10cfda8adb75...7f.exe
windows10-2004-x64
10dfe8591c80...49.exe
windows10-2004-x64
10f5659ff4e2...ff.exe
windows10-2004-x64
10Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
14381f89f8b411cd75bc72635e73d8b296854b0c9775f80c2fec874a6761d562.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1c09c6faad1ede18216df88b9d359543df5caacf810175b5e245e3e775b6b9a0.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1c09c6faad1ede18216df88b9d359543df5caacf810175b5e245e3e775b6b9a0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
1c8308039aad5dc9c98b1f72592672a2e272eb9b9a30430eeacea161036df416.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
1c8308039aad5dc9c98b1f72592672a2e272eb9b9a30430eeacea161036df416.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
1fe4c883d2d7c8f09c5eab45d00c85339660191140f68cf11bd29f978582386d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
234b8aa95903dd65d6bf32c7efe25bae41ba8582db1a5693afbd14a22bc6d4d8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
410e72302dee0862e82d58671c8a130371c31bc22e8fb1bdd2afad927b1716e8.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
410e72302dee0862e82d58671c8a130371c31bc22e8fb1bdd2afad927b1716e8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
4431aa7413f5833360f953b5d26f7cceefeb1dfd20705856a7c02d106943048c.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
4431aa7413f5833360f953b5d26f7cceefeb1dfd20705856a7c02d106943048c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
812ce70322ec6814a763ebe1e04731ab416e10201580d509b133509ad1ebcb27.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
90fdeaf3f05a7aeef335002874bfb485026c1a161854698d5277269287138ba8.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
90fdeaf3f05a7aeef335002874bfb485026c1a161854698d5277269287138ba8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
9d92aedf9d3d83efd8e1d100f6dcbfc358fb8b26adeb6e51769c0e756d95b09d.exe
Resource
win7-20240419-en
Behavioral task
behavioral19
Sample
9d92aedf9d3d83efd8e1d100f6dcbfc358fb8b26adeb6e51769c0e756d95b09d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
9ff2fb6bb8d4c7395ec24382b3b06db1e89b1ac0e5ceaebaba03805cbaa21532.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
ac4e2e3d9de1b4a0639391f365147200e1175cbe0c399b62625a5fe2ff4acedd.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
ac4e2e3d9de1b4a0639391f365147200e1175cbe0c399b62625a5fe2ff4acedd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
b62483116d18fcce423634c2d593e9a4337f6e491ba99627ad7d7030d97546b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
c901122f0065d9da89857ec8341cf2ffba9fd5fd9ac4717e138a6b96c776b070.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
cfda8adb7597e205b205c916dd913856ad96e83acc3a76ec0ca6f85b8cb33c7f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
dfe8591c80d0895e6a0ba6ab5324840b06b4acfdc0570bbc6eea97239314ef49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
f5659ff4e2e2c4f553f6a9f59f406907a29545e4ca9d61810be718d9619a8dff.exe
Resource
win10v2004-20240226-en
General
-
Target
0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe
-
Size
1.5MB
-
MD5
c8300b6950b7d72d3b59a352609e3c56
-
SHA1
972cf57fe17290050684f2f291d866aacd7d2c54
-
SHA256
0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020
-
SHA512
5605a80e79c4926c3c72bc1aebd3b4065268cf66dbdc911c2f5413fdabecbb7c2fa372782b407270ab1d2fcbdc80180dcd546d273a4f914ed59bf3bca83055a1
-
SSDEEP
24576:Ay8LugT4ZToAo074txPEcwbOHXJ0OyqGqBven4ZMbtxppZRvCII:H8L7T4JoAqtxCSZPFG8vHZWPVv
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1332-35-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/1332-38-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/1332-40-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2nt525Xq.exe family_redline behavioral1/memory/628-42-0x00000000008B0000-0x00000000008EE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
Af8RI0Ie.exeYH2Og3Jc.exeKq5QL1VX.exeET9lF9Bu.exe1gk37JI4.exe2nt525Xq.exepid process 1652 Af8RI0Ie.exe 380 YH2Og3Jc.exe 724 Kq5QL1VX.exe 4288 ET9lF9Bu.exe 4392 1gk37JI4.exe 628 2nt525Xq.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
Af8RI0Ie.exeYH2Og3Jc.exeKq5QL1VX.exeET9lF9Bu.exe0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Af8RI0Ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" YH2Og3Jc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Kq5QL1VX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ET9lF9Bu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1gk37JI4.exedescription pid process target process PID 4392 set thread context of 1332 4392 1gk37JI4.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exeAf8RI0Ie.exeYH2Og3Jc.exeKq5QL1VX.exeET9lF9Bu.exe1gk37JI4.exedescription pid process target process PID 1532 wrote to memory of 1652 1532 0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe Af8RI0Ie.exe PID 1532 wrote to memory of 1652 1532 0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe Af8RI0Ie.exe PID 1532 wrote to memory of 1652 1532 0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe Af8RI0Ie.exe PID 1652 wrote to memory of 380 1652 Af8RI0Ie.exe YH2Og3Jc.exe PID 1652 wrote to memory of 380 1652 Af8RI0Ie.exe YH2Og3Jc.exe PID 1652 wrote to memory of 380 1652 Af8RI0Ie.exe YH2Og3Jc.exe PID 380 wrote to memory of 724 380 YH2Og3Jc.exe Kq5QL1VX.exe PID 380 wrote to memory of 724 380 YH2Og3Jc.exe Kq5QL1VX.exe PID 380 wrote to memory of 724 380 YH2Og3Jc.exe Kq5QL1VX.exe PID 724 wrote to memory of 4288 724 Kq5QL1VX.exe ET9lF9Bu.exe PID 724 wrote to memory of 4288 724 Kq5QL1VX.exe ET9lF9Bu.exe PID 724 wrote to memory of 4288 724 Kq5QL1VX.exe ET9lF9Bu.exe PID 4288 wrote to memory of 4392 4288 ET9lF9Bu.exe 1gk37JI4.exe PID 4288 wrote to memory of 4392 4288 ET9lF9Bu.exe 1gk37JI4.exe PID 4288 wrote to memory of 4392 4288 ET9lF9Bu.exe 1gk37JI4.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4392 wrote to memory of 1332 4392 1gk37JI4.exe AppLaunch.exe PID 4288 wrote to memory of 628 4288 ET9lF9Bu.exe 2nt525Xq.exe PID 4288 wrote to memory of 628 4288 ET9lF9Bu.exe 2nt525Xq.exe PID 4288 wrote to memory of 628 4288 ET9lF9Bu.exe 2nt525Xq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe"C:\Users\Admin\AppData\Local\Temp\0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Af8RI0Ie.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Af8RI0Ie.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YH2Og3Jc.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YH2Og3Jc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Kq5QL1VX.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Kq5QL1VX.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ET9lF9Bu.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ET9lF9Bu.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1gk37JI4.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1gk37JI4.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2nt525Xq.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2nt525Xq.exe6⤵
- Executes dropped EXE
PID:628
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD57aa537ae0a9f7b5540187726d4a7fe78
SHA11a511834bf82fe512dccb4dbee9bbcb1734825c6
SHA25660b78beb4087088fad593d16af47076e2ec887ae3d79d882819aecf895d0d0ed
SHA512ede8b5f67cd6f10421d56a512a50c3b881a3842b93246f46d870a6696744416da683e38ccd26c71015b9cac2b10dcc6c4bd19ee56422aedaeeced0fa0cd8180a
-
Filesize
1.1MB
MD5a6b6cb545c884c90acf729a9f6d968f5
SHA1be4e7220bc6cc53dc6725847f2b3b81e205f294c
SHA2566752da517ee3c6ab662e567131e194337416990736590d66456f6aa0de3f4aa5
SHA5121e081e1a825b4814de28addafdb4375818ab27b88323e054e2f6939bf4ca56d83f751b18c56db2189aeee250a1da7459eec424f57be8aae5d0acd123cdadab39
-
Filesize
759KB
MD517bf3d3e2ad4da0b32c834386087fb89
SHA1070e7dc64877a8d22499509600db23dfcc78f125
SHA25630fa8e5b8d943ea0d6cef95946b81bbade3bcf4320251fdbe413a2d60e2e6b25
SHA5121580e13665d7943acac390f1d37e5033fa43e3c48f340a1bfb60c400aff5d219e08358ffe76d3e5f269718d422e9e1056132b41c60e62f6ecd489296f1d0af0f
-
Filesize
563KB
MD59bcb99b59e64a1495408ed4665ae0dd0
SHA1309a421488aeeff17f4d2c7e35508b0e65f1c2bd
SHA256742f8905fb22252704c7420f81e18088321c7a0ee6fe09a0c0b572e49b8bed65
SHA512bf5184b423c8e895f0afcff7e7762952a362c1852b246931b69565f018fdbca76ca8d80b78836af2a57209303560b65c8b54c6d9faa2eae44fc5473069bf9238
-
Filesize
1.1MB
MD5a29766e64062c9482a379a14878dc8df
SHA1a5e98a91d641851d7c7c00a78d74b7e4f6f568c8
SHA256f620f27f93ce916b2b84c785fd3e5124fb610f8e4453eee820ef98200ec40192
SHA512b520f64f219a7b91077d341b1d1cb9f1cbd93cedda86f5e97a6588a39a018ab9db68d516e1bd4cdafe72e2c3f97311d85da4f10c0547bf26e08077b51c8e8e3d
-
Filesize
221KB
MD5a763c13abbca649b7659894bc9e356a8
SHA11155ef499dcba22905cc6aee6d984fa76f3fcb6b
SHA25693c835f9102f7405390dd40576460c5e9c8de912d98612346af095fca210949a
SHA51278a021f44c5789a92d65c6e468b760fa3eadd295e489e449df6bc886bddea72aa2bfad30b3017640c05824e0b788f63d1ad864810f7b1fa33d634c4ef155f27e