Overview
overview
10Static
static
3005cc897c6...01.exe
windows7-x64
3005cc897c6...01.exe
windows10-2004-x64
100f5dadb4ff...d5.exe
windows10-2004-x64
1015191ca573...45.exe
windows10-2004-x64
101f1cdd32ef...a5.exe
windows7-x64
31f1cdd32ef...a5.exe
windows10-2004-x64
1033277efd72...bf.exe
windows7-x64
333277efd72...bf.exe
windows10-2004-x64
1039b1b5acca...89.exe
windows10-2004-x64
1041914bb3aa...45.exe
windows10-2004-x64
104dc93952d5...05.exe
windows10-2004-x64
10636c6831e9...2d.exe
windows10-2004-x64
106371475aa9...ca.exe
windows10-2004-x64
106d98d2425a...11.exe
windows7-x64
36d98d2425a...11.exe
windows10-2004-x64
107d59382353...89.exe
windows7-x64
37d59382353...89.exe
windows10-2004-x64
107e9155d192...9c.exe
windows10-2004-x64
10817be3f5a4...87.exe
windows10-2004-x64
1084d690a678...8a.exe
windows10-2004-x64
108a833f1e2a...9a.exe
windows10-2004-x64
10a6207c613c...04.exe
windows7-x64
3a6207c613c...04.exe
windows10-2004-x64
10b843b5d179...78.exe
windows10-2004-x64
10bc0a361a97...2b.exe
windows10-2004-x64
10ccede3ed34...14.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
005cc897c6fa2cdd0e0e44ec50a4f2ff3e7fa8269fe1ec09728e601cc06d9e01.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
005cc897c6fa2cdd0e0e44ec50a4f2ff3e7fa8269fe1ec09728e601cc06d9e01.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1f1cdd32efd5cdc4a70d77af2754296f6ddbca64d78c083caa19118964d61da5.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1f1cdd32efd5cdc4a70d77af2754296f6ddbca64d78c083caa19118964d61da5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
33277efd72a246f701b9c69dc414ee0ebab7e3cb5f576fa767dd942f09ac2dbf.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
33277efd72a246f701b9c69dc414ee0ebab7e3cb5f576fa767dd942f09ac2dbf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
39b1b5acca4de23a0180f902e3a92a03033ff877100271cfa20f0e782d62e989.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
41914bb3aa2d5a67292b5d348f81c71672076d674269fd9bfcbdb103aebf3d45.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
4dc93952d5fe7ecacd61cc033cbd3cdb682618f54ff89b22880ba0684a40e205.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
636c6831e9337ae0be8ccc466e94bff1945dfb0b1bb8dad69a2978f68f48512d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
6371475aa9cb4cc2dbcc2fa375c4d6e0f02eafc68e30119f4364189b97538dca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
6d98d2425aec61b790c642e31bda2ca87b98b6470b4dd60c08de1708587f1411.exe
Resource
win7-20240220-en
Behavioral task
behavioral15
Sample
6d98d2425aec61b790c642e31bda2ca87b98b6470b4dd60c08de1708587f1411.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
7d593823534c8bf5350a484383ae4c14165657f28d693b17a2faa06916c58289.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
7d593823534c8bf5350a484383ae4c14165657f28d693b17a2faa06916c58289.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
7e9155d19244bf4b3b908d8e3f9ee675fe08dd54149e960aadc1447230b8319c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
817be3f5a49a23d678fd0cb76bb61abf50214569606ac3d0d0600befd2d9c787.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
84d690a678e5c3055ce0a83992c921f35e5bf7b165506a695de85c34cf7b138a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
8a833f1e2a239f2ae11656b13c90eb1a39d92f5fca65599dbebd1081f208469a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
a6207c613c2f1beb9db6fd16ae372212cbd82f73a8c94afafe4c867a27518304.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
a6207c613c2f1beb9db6fd16ae372212cbd82f73a8c94afafe4c867a27518304.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
b843b5d1795644ec9e6dd14071ee33ee66683585f07a6c89d61ec113d763d278.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
bc0a361a973318fa776eb3e7f9c88901ca8d1d588434f1df0348b63576b6412b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe
Resource
win10v2004-20240426-en
General
-
Target
0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe
-
Size
271KB
-
MD5
5af274b4ec34f8ca1aa618b4683ca763
-
SHA1
560dfe709ea698121da7425ee91c19d6a590c128
-
SHA256
0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5
-
SHA512
ca99f4d57e2af2f5a5865d90411b563f6055cf78b0dadc399eaab2e186185ecc76c554766d7d9b15bbe21fcc37bcf11a1b6124d2191067085ffe4e495969a1ff
-
SSDEEP
6144:Kcy+bnr+fp0yN90QE/d3Y9n7/kYcDBn0X9sVhLnK:wMrLy90Zdo9n7+9n+9sV1nK
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Signatures
-
Detect Mystic stealer payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9621619.exe mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4298412.exe family_redline behavioral3/memory/1920-11-0x0000000000DB0000-0x0000000000DE0000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
Processes:
m9621619.exen4298412.exepid process 3832 m9621619.exe 1920 n4298412.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exedescription pid process target process PID 3936 wrote to memory of 3832 3936 0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe m9621619.exe PID 3936 wrote to memory of 3832 3936 0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe m9621619.exe PID 3936 wrote to memory of 3832 3936 0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe m9621619.exe PID 3936 wrote to memory of 1920 3936 0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe n4298412.exe PID 3936 wrote to memory of 1920 3936 0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe n4298412.exe PID 3936 wrote to memory of 1920 3936 0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe n4298412.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe"C:\Users\Admin\AppData\Local\Temp\0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9621619.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9621619.exe2⤵
- Executes dropped EXE
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4298412.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4298412.exe2⤵
- Executes dropped EXE
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD53ee6ef38332427bb03193ce9f52572e3
SHA1faf7bf555889ba631a225c14e24c7e947cecb9a5
SHA256f24a1a7658e4770cff207e6d33f505d5a9a1d83dacfd55aef11725c34c771401
SHA5129033aeb4a9afc80e4d19c07d4194f1e563d3a05eaf4024da48c1f5d2c4c693402341f4788f2a07d8160ceed96948bb19070bd0f2bdd9d42fc4c8624321e98045
-
Filesize
175KB
MD5978ff35f63b2136daf365d67df9fee98
SHA130d547fcefbc6e04f966e86afde0f6bc810b8ebf
SHA256b10a6c4dc8fc748a494767b52ec4a765dbb7625da12b48c7d52a81259a5bd9b1
SHA512f8f34470185368b67ad95d436f152d6115d89ef1b72baa6661afa163ea8748b52988b04605af79dfad95f01e18a75568f2f0a810a1ebd9ba3a7ef5d6f1433b23