Overview
overview
10Static
static
32ae72cafa8...de.exe
windows10-2004-x64
102d225565e0...be.exe
windows10-2004-x64
105f94dabf69...6d.exe
windows10-2004-x64
1065296f4680...95.exe
windows7-x64
365296f4680...95.exe
windows10-2004-x64
107618ddb9e4...07.exe
windows10-2004-x64
108865ec3f94...5a.exe
windows10-2004-x64
108d796a364d...e4.exe
windows10-2004-x64
10aabdc92d30...96.exe
windows10-2004-x64
10bae99364dc...55.exe
windows10-2004-x64
10cc35c0b2bc...24.exe
windows10-2004-x64
10d63c4114c3...86.exe
windows10-2004-x64
10d65bb810cc...a7.exe
windows10-2004-x64
10d764830962...c8.exe
windows10-2004-x64
10d9124df1a4...d1.exe
windows10-2004-x64
10e1564be8f1...ad.exe
windows10-2004-x64
10e7ee230707...d5.exe
windows10-2004-x64
10e8a7f5f2b3...4b.exe
windows10-2004-x64
10e8bf7b5c22...96.exe
windows10-2004-x64
10eb214d5f58...c6.exe
windows10-2004-x64
10edacb614f4...95.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2ae72cafa8f21759370b4609f21d845fbedad29052bfdacb21408b021b7ef6de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2d225565e090ae7f3ebf2de337fac7a1658473382e87c3cef7cac8a13b7f5ebe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
5f94dabf691f3432b26ad16c1f7ecb24292db785b9562faeb1131ea9306e6a6d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
7618ddb9e4a4f8eb9facccaca5f824467c35a2b211a133dc5f4f30148b77b907.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8865ec3f949ea2778d72427ba8f147c8a4182420bdfdbe11b0a8b53c48b0a95a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
aabdc92d3092215c39aff5ff3cdd7b86a2827e8ddaa5a11c8ac53332bfd6fa96.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
cc35c0b2bc4afaa3e56d0b585ddf1928790ef237331a245ad0eb919b4e8c2524.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
d63c4114c36e73dd975c0cc4a3dc67316e090266f64cd492ec17a7dabcdbe686.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
e1564be8f124041c0c125d9557c302f4631504d0048e1c1f41b6abfb473ebbad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e8a7f5f2b344eb468a91c59dbe8699a08d71f9b708a1134c8948cf194516594b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
e8bf7b5c22a787af15a42638894b8f1eccc3320134f42f09939f4932df0cc796.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
eb214d5f5806ec4617c2b7cde5e3a5beb5a3c254a391dee7605decfe13174bc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
edacb614f4d4ad4a3dd9e9d5ad37ba56d1e7d49ddad0b14ca3ce632b0a820f95.exe
Resource
win10v2004-20240508-en
General
-
Target
d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe
-
Size
1.3MB
-
MD5
0c51767548ed6965b9d3ccb2ba84cde1
-
SHA1
000014edd0e804ddb4bd99aebb086efc76ac5a03
-
SHA256
d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7
-
SHA512
6d1695dd7859f54b6126544650421367b741330212068673402d9f971587ac27a9e9c721934decea3e4f7ebf9f8c6d43b123a2e12c6f7727b40f3d1575c76ba0
-
SSDEEP
24576:uyiIDMKCYrzNfqjQXkOikMzAm4vtksKlet5XJzNtaIIcc52ig45Kx1I+B:9iIDMKFrJfqcXkOTMsmInUeXJ2IVigg9
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral13/files/0x0008000000023452-33.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral13/files/0x0007000000023453-36.dat family_redline behavioral13/memory/4532-38-0x0000000000ED0000-0x0000000000F0E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 412 Kk2OF6oI.exe 3304 ev7kM1GH.exe 1896 jw8JJ3mr.exe 2004 Ff7ld6ri.exe 432 1Fs26Bg4.exe 4532 2uZ650ND.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ev7kM1GH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" jw8JJ3mr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Ff7ld6ri.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Kk2OF6oI.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1584 wrote to memory of 412 1584 d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe 82 PID 1584 wrote to memory of 412 1584 d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe 82 PID 1584 wrote to memory of 412 1584 d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe 82 PID 412 wrote to memory of 3304 412 Kk2OF6oI.exe 83 PID 412 wrote to memory of 3304 412 Kk2OF6oI.exe 83 PID 412 wrote to memory of 3304 412 Kk2OF6oI.exe 83 PID 3304 wrote to memory of 1896 3304 ev7kM1GH.exe 84 PID 3304 wrote to memory of 1896 3304 ev7kM1GH.exe 84 PID 3304 wrote to memory of 1896 3304 ev7kM1GH.exe 84 PID 1896 wrote to memory of 2004 1896 jw8JJ3mr.exe 85 PID 1896 wrote to memory of 2004 1896 jw8JJ3mr.exe 85 PID 1896 wrote to memory of 2004 1896 jw8JJ3mr.exe 85 PID 2004 wrote to memory of 432 2004 Ff7ld6ri.exe 86 PID 2004 wrote to memory of 432 2004 Ff7ld6ri.exe 86 PID 2004 wrote to memory of 432 2004 Ff7ld6ri.exe 86 PID 2004 wrote to memory of 4532 2004 Ff7ld6ri.exe 87 PID 2004 wrote to memory of 4532 2004 Ff7ld6ri.exe 87 PID 2004 wrote to memory of 4532 2004 Ff7ld6ri.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe"C:\Users\Admin\AppData\Local\Temp\d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Kk2OF6oI.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Kk2OF6oI.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ev7kM1GH.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ev7kM1GH.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jw8JJ3mr.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jw8JJ3mr.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ff7ld6ri.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ff7ld6ri.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Fs26Bg4.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Fs26Bg4.exe6⤵
- Executes dropped EXE
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2uZ650ND.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2uZ650ND.exe6⤵
- Executes dropped EXE
PID:4532
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52b75803aa30126bb7c2c97d324ea49af
SHA153ddaf2674be3a5d8590767e04de21850c3d9c2e
SHA256bb2a652e4e62c9e6f7ea498c1e1c399989724eb4f10c63a81ccd56ebf23255cd
SHA51293c4268f5838a9555a260b5ece5eb3b0d1df3ebef6b6b42d169ed7776b81027b4aac2bad28972bd7c3309cf9c75fe1e20158eeced3a6c76c637c4e0718ad496e
-
Filesize
1.0MB
MD5a954aec9a9012d80def332169cb57a96
SHA1f7288e871c126526803f95823e6c14383dfb9053
SHA256769f1a11b614f4335c824ed2e68552703ccb9e1d9375ca9f4fef7b8c2b5df745
SHA5128aa138c2031ba3260d8610bfe79c45efdf6806efdd490262c72ad5cbc70c99c69384924d01f82ef7c4cdc11b7833e05fda182647d9d53bfa8b56f052fc43f04e
-
Filesize
522KB
MD5e26c489f24740eebf9e8f2830a46580e
SHA1afd5813c91538fe44e7febed60a0f65dc4b61168
SHA2562f617c6be79ee926fcd15814cef7e807a4c050a1a627afbb300cd94a2709ec97
SHA512cec157748d8a697924ecc3ee34043609f6b4fa486d85bc04fa6d3fc583fee7453c7d70dcafd2fd24078995f6b482ad3b194c3185e166cffc7195ce76f968a079
-
Filesize
326KB
MD54b21a3aa9c58ecded687a2e14c069fe2
SHA1fa2c22b1ed6a1245e0e273b63b22586338512642
SHA256ab45a9192ab73cd4aba00baf62a88f57d1e5a077bcff596fe4c1a1e35ec15d7f
SHA512ebecf9f9c397d780ca23bf4091a94cd151ed2f6a3ef1b9204c301c6c13f0e3837b87fb88e27ab81623cc039665a51d4e26a481a08586fe623e2e0249534a6736
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84
-
Filesize
221KB
MD5f5d4adbeeb0f17a2a770bef89e92c2b7
SHA1303fad31b1bcbf428574a77d51d50c88156a230d
SHA2567f17370951d01481898818536e694193138aebe3f8e40e863509ac0d43d593a5
SHA5128556df9d008682ac5d812911417b3034b7dc688b56117a4286986faa80c161609beed31c2bc7790c421dc71cae27b64d07a71d58012c89953be087eaee8d60bc