Overview
overview
10Static
static
32ae72cafa8...de.exe
windows10-2004-x64
102d225565e0...be.exe
windows10-2004-x64
105f94dabf69...6d.exe
windows10-2004-x64
1065296f4680...95.exe
windows7-x64
365296f4680...95.exe
windows10-2004-x64
107618ddb9e4...07.exe
windows10-2004-x64
108865ec3f94...5a.exe
windows10-2004-x64
108d796a364d...e4.exe
windows10-2004-x64
10aabdc92d30...96.exe
windows10-2004-x64
10bae99364dc...55.exe
windows10-2004-x64
10cc35c0b2bc...24.exe
windows10-2004-x64
10d63c4114c3...86.exe
windows10-2004-x64
10d65bb810cc...a7.exe
windows10-2004-x64
10d764830962...c8.exe
windows10-2004-x64
10d9124df1a4...d1.exe
windows10-2004-x64
10e1564be8f1...ad.exe
windows10-2004-x64
10e7ee230707...d5.exe
windows10-2004-x64
10e8a7f5f2b3...4b.exe
windows10-2004-x64
10e8bf7b5c22...96.exe
windows10-2004-x64
10eb214d5f58...c6.exe
windows10-2004-x64
10edacb614f4...95.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2ae72cafa8f21759370b4609f21d845fbedad29052bfdacb21408b021b7ef6de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2d225565e090ae7f3ebf2de337fac7a1658473382e87c3cef7cac8a13b7f5ebe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
5f94dabf691f3432b26ad16c1f7ecb24292db785b9562faeb1131ea9306e6a6d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
7618ddb9e4a4f8eb9facccaca5f824467c35a2b211a133dc5f4f30148b77b907.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8865ec3f949ea2778d72427ba8f147c8a4182420bdfdbe11b0a8b53c48b0a95a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
aabdc92d3092215c39aff5ff3cdd7b86a2827e8ddaa5a11c8ac53332bfd6fa96.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
cc35c0b2bc4afaa3e56d0b585ddf1928790ef237331a245ad0eb919b4e8c2524.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
d63c4114c36e73dd975c0cc4a3dc67316e090266f64cd492ec17a7dabcdbe686.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
e1564be8f124041c0c125d9557c302f4631504d0048e1c1f41b6abfb473ebbad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e8a7f5f2b344eb468a91c59dbe8699a08d71f9b708a1134c8948cf194516594b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
e8bf7b5c22a787af15a42638894b8f1eccc3320134f42f09939f4932df0cc796.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
eb214d5f5806ec4617c2b7cde5e3a5beb5a3c254a391dee7605decfe13174bc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
edacb614f4d4ad4a3dd9e9d5ad37ba56d1e7d49ddad0b14ca3ce632b0a820f95.exe
Resource
win10v2004-20240508-en
General
-
Target
e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe
-
Size
1.2MB
-
MD5
dbf8c4938f5d91edbe1397152cd798e4
-
SHA1
1504a1c541e719d2ee3632f75eda67df89dd2d6c
-
SHA256
e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5
-
SHA512
7517f63dfa3127e89db5a4bf65013112f3c25990349beae782ecc77b5d7a091c71866ad1e70832e50aead3259d7632b064d55b299fa0938de1e230ddb80a0c2d
-
SSDEEP
24576:cyWfF+5tfwol4Y6uxAZNJTn8TH0SGujiVknqqIefUrobxH4g:Lu+51wit6uWNJM8ujrvffBxH4
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral17/memory/3024-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral17/memory/3024-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral17/memory/3024-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral17/files/0x000700000002342b-40.dat family_redline behavioral17/memory/1840-42-0x0000000000140000-0x000000000017E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 984 Fa0kC2JD.exe 1028 ky1ub7Su.exe 1352 WK3SV5rF.exe 3672 Dm7Lo8Hk.exe 2524 1Fi82yd4.exe 1840 2Rl386BO.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Fa0kC2JD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ky1ub7Su.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" WK3SV5rF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Dm7Lo8Hk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2524 set thread context of 3024 2524 1Fi82yd4.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 3288 2524 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4668 wrote to memory of 984 4668 e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe 82 PID 4668 wrote to memory of 984 4668 e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe 82 PID 4668 wrote to memory of 984 4668 e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe 82 PID 984 wrote to memory of 1028 984 Fa0kC2JD.exe 83 PID 984 wrote to memory of 1028 984 Fa0kC2JD.exe 83 PID 984 wrote to memory of 1028 984 Fa0kC2JD.exe 83 PID 1028 wrote to memory of 1352 1028 ky1ub7Su.exe 84 PID 1028 wrote to memory of 1352 1028 ky1ub7Su.exe 84 PID 1028 wrote to memory of 1352 1028 ky1ub7Su.exe 84 PID 1352 wrote to memory of 3672 1352 WK3SV5rF.exe 85 PID 1352 wrote to memory of 3672 1352 WK3SV5rF.exe 85 PID 1352 wrote to memory of 3672 1352 WK3SV5rF.exe 85 PID 3672 wrote to memory of 2524 3672 Dm7Lo8Hk.exe 86 PID 3672 wrote to memory of 2524 3672 Dm7Lo8Hk.exe 86 PID 3672 wrote to memory of 2524 3672 Dm7Lo8Hk.exe 86 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 2524 wrote to memory of 3024 2524 1Fi82yd4.exe 88 PID 3672 wrote to memory of 1840 3672 Dm7Lo8Hk.exe 95 PID 3672 wrote to memory of 1840 3672 Dm7Lo8Hk.exe 95 PID 3672 wrote to memory of 1840 3672 Dm7Lo8Hk.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe"C:\Users\Admin\AppData\Local\Temp\e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fa0kC2JD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fa0kC2JD.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ky1ub7Su.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ky1ub7Su.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WK3SV5rF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WK3SV5rF.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Dm7Lo8Hk.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Dm7Lo8Hk.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Fi82yd4.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Fi82yd4.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 6167⤵
- Program crash
PID:3288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Rl386BO.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Rl386BO.exe6⤵
- Executes dropped EXE
PID:1840
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2524 -ip 25241⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5cbfe57c7f64571e4db8a0794519145d1
SHA16a842d626114d856a3a6afd6484bcc5109e96111
SHA256065c29b3d45f6c94f557b255bcd41408d81a672e23146db67c6e9a14c781412f
SHA512bacf81fab36ac61dc04210e9dd2ab340cb7314e03d8b13fc77c6ce342fd69404478d482e787bf31b107725b253d10a6bdb83cac001de2a20cba979d915136631
-
Filesize
879KB
MD54e83331089467d533859213969534c69
SHA1eda502b6d74256409cb54c8f077cdbe1603f8a10
SHA2569abeacac4b46d2b66ea5742ed727b0817fc3da761808cdc463ea9ff215c21cda
SHA512cf013d774058a6ae137f2a9ee47480c71cf508d09f0383b64d4bce7ade6f6246689e4581c7feeddb9bf27a66ddd329e948777d1a02c849986cf4d4c94bd0e9b7
-
Filesize
585KB
MD5e9690d2c4887545f8d359b008022f0f9
SHA1162ad41331f5009286a6a00b34e9dc8b80969deb
SHA256aa966884775c6010f2322df4cc847fbb855aee4a111dc42de26cf8af4bec747c
SHA512b33a225bda44009fe2039416f82f5274f2da4324ec6f365d91cc98be23c3c9eaf0cb49f719c63cf147b4b93baf2e4b3b9dd33d016512af24fc1b8532e386b219
-
Filesize
413KB
MD5a61ed0973f2f67b383a23deec4373a25
SHA1feabded3966d9f6b3a40926b3d61b1e864e72321
SHA2565e075f8a3c0ea95a8a2e33928d55b9bb815d3a2229417ac19cdf451f69792ff0
SHA51212ad5aa4b3cfcc4a171c0eb9918c56c41e0fe2d777f427b776832f577c1be5d38867ee36856ecfbeea2654fd6c50938144e429201c777e9c2d1a6145ef1996fb
-
Filesize
378KB
MD5fa699c7a8e4c25ebbcc131a187c29030
SHA1e2ece7ca7fde2ea2663acf2828a13eaaf75f3634
SHA256f9978754dfa34a7c256c934d8f269656e055460c74e5d83d405db8c72da97d6d
SHA512f56d09031d8b65f8cff581ad86c1857abfa7e500ed453f97bbc320e8608b784cb105cc895f290415c32aea1a6ed265fb46290d06d88ec6a6622a4d8425426943
-
Filesize
221KB
MD55b1d002dd95df28163e0cb165f906962
SHA15bbdd968523e58cf26c790740863013fd061fdb8
SHA2568af7c473dc9a1d4e04ea987626ed08d698942568de861dab6a123a03b72d6c28
SHA5128d8b211534506811e3a4f9c53eb9f29f8851f66e41b165c80272fc3aeaabf94998a3c44cf0d02e165b9191ab553eca6aeb420c325abca5e34f549fdf5cec6526