Overview
overview
10Static
static
30bbde9df88...20.exe
windows10-2004-x64
1014381f89f8...62.exe
windows10-2004-x64
101c09c6faad...a0.exe
windows7-x64
31c09c6faad...a0.exe
windows10-2004-x64
101c8308039a...16.exe
windows7-x64
31c8308039a...16.exe
windows10-2004-x64
101fe4c883d2...6d.exe
windows10-2004-x64
10234b8aa959...d8.exe
windows10-2004-x64
10410e72302d...e8.exe
windows7-x64
3410e72302d...e8.exe
windows10-2004-x64
104431aa7413...8c.exe
windows7-x64
34431aa7413...8c.exe
windows10-2004-x64
1068f997d58c...e5.exe
windows10-2004-x64
10812ce70322...27.exe
windows10-2004-x64
1088a3f8285d...ab.exe
windows10-2004-x64
1090fdeaf3f0...a8.exe
windows7-x64
390fdeaf3f0...a8.exe
windows10-2004-x64
109d92aedf9d...9d.exe
windows7-x64
39d92aedf9d...9d.exe
windows10-2004-x64
109ff2fb6bb8...32.exe
windows10-2004-x64
10ac4e2e3d9d...dd.exe
windows7-x64
3ac4e2e3d9d...dd.exe
windows10-2004-x64
10b62483116d...b6.exe
windows10-2004-x64
10c901122f00...70.exe
windows10-2004-x64
10cfda8adb75...7f.exe
windows10-2004-x64
10dfe8591c80...49.exe
windows10-2004-x64
10f5659ff4e2...ff.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
14381f89f8b411cd75bc72635e73d8b296854b0c9775f80c2fec874a6761d562.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1c09c6faad1ede18216df88b9d359543df5caacf810175b5e245e3e775b6b9a0.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1c09c6faad1ede18216df88b9d359543df5caacf810175b5e245e3e775b6b9a0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
1c8308039aad5dc9c98b1f72592672a2e272eb9b9a30430eeacea161036df416.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
1c8308039aad5dc9c98b1f72592672a2e272eb9b9a30430eeacea161036df416.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
1fe4c883d2d7c8f09c5eab45d00c85339660191140f68cf11bd29f978582386d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
234b8aa95903dd65d6bf32c7efe25bae41ba8582db1a5693afbd14a22bc6d4d8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
410e72302dee0862e82d58671c8a130371c31bc22e8fb1bdd2afad927b1716e8.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
410e72302dee0862e82d58671c8a130371c31bc22e8fb1bdd2afad927b1716e8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
4431aa7413f5833360f953b5d26f7cceefeb1dfd20705856a7c02d106943048c.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
4431aa7413f5833360f953b5d26f7cceefeb1dfd20705856a7c02d106943048c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
812ce70322ec6814a763ebe1e04731ab416e10201580d509b133509ad1ebcb27.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
90fdeaf3f05a7aeef335002874bfb485026c1a161854698d5277269287138ba8.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
90fdeaf3f05a7aeef335002874bfb485026c1a161854698d5277269287138ba8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
9d92aedf9d3d83efd8e1d100f6dcbfc358fb8b26adeb6e51769c0e756d95b09d.exe
Resource
win7-20240508-en
Behavioral task
behavioral19
Sample
9d92aedf9d3d83efd8e1d100f6dcbfc358fb8b26adeb6e51769c0e756d95b09d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
9ff2fb6bb8d4c7395ec24382b3b06db1e89b1ac0e5ceaebaba03805cbaa21532.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ac4e2e3d9de1b4a0639391f365147200e1175cbe0c399b62625a5fe2ff4acedd.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
ac4e2e3d9de1b4a0639391f365147200e1175cbe0c399b62625a5fe2ff4acedd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
b62483116d18fcce423634c2d593e9a4337f6e491ba99627ad7d7030d97546b6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
c901122f0065d9da89857ec8341cf2ffba9fd5fd9ac4717e138a6b96c776b070.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
cfda8adb7597e205b205c916dd913856ad96e83acc3a76ec0ca6f85b8cb33c7f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
dfe8591c80d0895e6a0ba6ab5324840b06b4acfdc0570bbc6eea97239314ef49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
f5659ff4e2e2c4f553f6a9f59f406907a29545e4ca9d61810be718d9619a8dff.exe
Resource
win10v2004-20240426-en
General
-
Target
88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe
-
Size
1.5MB
-
MD5
51dc5e34d011caff999a1f9ee1549a4a
-
SHA1
f8cf9142d4e52a2f35ce87202cc95c71016dcf6f
-
SHA256
88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab
-
SHA512
f0986389d9aa09199f4ba6a1088a304df62b2d52c7a1c8e17f927fab92d31fdce3fe2c76d633d82c7a09dbda2653ac5d5e15314a89c8f1835c312127aca22c76
-
SSDEEP
24576:aywkbZuL+gpeuXhFjOtq6wl5OupT6bwD1pih875p/o6s25fdizMKpfGAyRIC72R1:hwq0TLhZOtfwl5Ehop1Bq0SvlwOf
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral15/memory/4696-35-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral15/memory/4696-36-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral15/memory/4696-38-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral15/files/0x0007000000023452-40.dat family_redline behavioral15/memory/4544-42-0x0000000000420000-0x000000000045E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3124 hn5vV4JF.exe 1476 uy2ZC2Dk.exe 1572 aJ3Ei1Ez.exe 4968 kV4qy8Qb.exe 1488 1Bt35dj2.exe 4544 2dT447iM.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" aJ3Ei1Ez.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" kV4qy8Qb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" hn5vV4JF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" uy2ZC2Dk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1488 set thread context of 4696 1488 1Bt35dj2.exe 96 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1584 wrote to memory of 3124 1584 88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe 82 PID 1584 wrote to memory of 3124 1584 88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe 82 PID 1584 wrote to memory of 3124 1584 88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe 82 PID 3124 wrote to memory of 1476 3124 hn5vV4JF.exe 83 PID 3124 wrote to memory of 1476 3124 hn5vV4JF.exe 83 PID 3124 wrote to memory of 1476 3124 hn5vV4JF.exe 83 PID 1476 wrote to memory of 1572 1476 uy2ZC2Dk.exe 85 PID 1476 wrote to memory of 1572 1476 uy2ZC2Dk.exe 85 PID 1476 wrote to memory of 1572 1476 uy2ZC2Dk.exe 85 PID 1572 wrote to memory of 4968 1572 aJ3Ei1Ez.exe 86 PID 1572 wrote to memory of 4968 1572 aJ3Ei1Ez.exe 86 PID 1572 wrote to memory of 4968 1572 aJ3Ei1Ez.exe 86 PID 4968 wrote to memory of 1488 4968 kV4qy8Qb.exe 88 PID 4968 wrote to memory of 1488 4968 kV4qy8Qb.exe 88 PID 4968 wrote to memory of 1488 4968 kV4qy8Qb.exe 88 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 1488 wrote to memory of 4696 1488 1Bt35dj2.exe 96 PID 4968 wrote to memory of 4544 4968 kV4qy8Qb.exe 97 PID 4968 wrote to memory of 4544 4968 kV4qy8Qb.exe 97 PID 4968 wrote to memory of 4544 4968 kV4qy8Qb.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe"C:\Users\Admin\AppData\Local\Temp\88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hn5vV4JF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hn5vV4JF.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uy2ZC2Dk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uy2ZC2Dk.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aJ3Ei1Ez.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aJ3Ei1Ez.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kV4qy8Qb.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kV4qy8Qb.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Bt35dj2.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Bt35dj2.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2dT447iM.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2dT447iM.exe6⤵
- Executes dropped EXE
PID:4544
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5a2cc7fa1c178a1457b6d2b8e517a2781
SHA1efab073cf57bb1eddc71554458f068e704e6f386
SHA256bf822462b12c552fed689013622b5845dbf31498ac4a863b9d3d4d476fb9f270
SHA51214bb8f965b8861c0788d14987ad180520d62d76588dcd14398b23963e7d575ac585757c188a6d4b9366ba7b4d31bedfb348eccc60a42e91f8f7a15fd404ce16f
-
Filesize
1.2MB
MD5e579c75924c9f5d08fbece532e8d0afa
SHA136c0c08bd0ecceb038c3369b956f267da2743914
SHA256cc0aa5fa646d545cb05c8f5ca53b119cdf6180f17ba43d794c00286f1bb60360
SHA512dfe2d3b72b3efbdeae2121c0ed4f2f364b51243ec723591261846bf1673a2d4b7858d8427e8506e868d51a99d9bb63d3bb9e53091767acca18d076d9af4a0f82
-
Filesize
761KB
MD53d949b70f76752350a9742cdedbda663
SHA1be6e5914404cc0c0fb6411cadcd3dc203688ede3
SHA256b2a65e0922cfd657a813e853698b272312f58fd06b937189def4c0689143e1da
SHA512e06b6b3a78307a939a33edd7fe68d5a69716d6761cbcdcc7a6903067fa0a233b7748ed7ab39468b59c899d172e81bbbb0ab38e3f74dd2a77affb1bb0015601a7
-
Filesize
565KB
MD5fd691783982a2f2a5c31aba5a5901a64
SHA10219be6588855b2d48aa255cf4be2f72aded1eb6
SHA2566a35128f0d1f3e3a237d5adb39b0df1d473d5a7f44d3cb7697a049d28a4966d0
SHA51270fbee4ef581e9de2aa8065db830c5acd1ae88e9758b554ad79bd6b48584100ff7531e72654066fc46c4cccbf745a22174a506231a2f32ee5d86d7354537882a
-
Filesize
1.1MB
MD55f6389b3bfedf445bf8c10b650709a6f
SHA16c8df73cb68c87cf1fd93fcc02a504f2de12ef86
SHA256ff8242ce5ba9502c0028b4a9fb619503b53337901e872f170bbf029ef5cf1227
SHA5121aff1570f4882924cb1eb5b7a02e01f8443cd6889c11e5ec7427268dd9d300a76d32002a4af116028a48530b839ec255a785426616d499ab6efa8997b10b6efa
-
Filesize
221KB
MD595f4d33d29cb808ce4bf3feefb475294
SHA1177b8c747d4b24b3c47c81be2d31061fc730c022
SHA256534de3c596a43eec549487e24a1b5f4e0cb6754430c6d89d8e0c637644e57a8b
SHA512d514fec869470f04a7a066e67e1d48fc98fda7908fdaa69d34525bc7a250cad8a57d93a35e1c6ea09976f1c3b92310db7d1746439a6cfc21348dfdc5ce952bb0