Overview
overview
10Static
static
32ae72cafa8...de.exe
windows10-2004-x64
102d225565e0...be.exe
windows10-2004-x64
105f94dabf69...6d.exe
windows10-2004-x64
1065296f4680...95.exe
windows7-x64
365296f4680...95.exe
windows10-2004-x64
107618ddb9e4...07.exe
windows10-2004-x64
108865ec3f94...5a.exe
windows10-2004-x64
108d796a364d...e4.exe
windows10-2004-x64
10aabdc92d30...96.exe
windows10-2004-x64
10bae99364dc...55.exe
windows10-2004-x64
10cc35c0b2bc...24.exe
windows10-2004-x64
10d63c4114c3...86.exe
windows10-2004-x64
10d65bb810cc...a7.exe
windows10-2004-x64
10d764830962...c8.exe
windows10-2004-x64
10d9124df1a4...d1.exe
windows10-2004-x64
10e1564be8f1...ad.exe
windows10-2004-x64
10e7ee230707...d5.exe
windows10-2004-x64
10e8a7f5f2b3...4b.exe
windows10-2004-x64
10e8bf7b5c22...96.exe
windows10-2004-x64
10eb214d5f58...c6.exe
windows10-2004-x64
10edacb614f4...95.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2ae72cafa8f21759370b4609f21d845fbedad29052bfdacb21408b021b7ef6de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2d225565e090ae7f3ebf2de337fac7a1658473382e87c3cef7cac8a13b7f5ebe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
5f94dabf691f3432b26ad16c1f7ecb24292db785b9562faeb1131ea9306e6a6d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
7618ddb9e4a4f8eb9facccaca5f824467c35a2b211a133dc5f4f30148b77b907.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8865ec3f949ea2778d72427ba8f147c8a4182420bdfdbe11b0a8b53c48b0a95a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
aabdc92d3092215c39aff5ff3cdd7b86a2827e8ddaa5a11c8ac53332bfd6fa96.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
cc35c0b2bc4afaa3e56d0b585ddf1928790ef237331a245ad0eb919b4e8c2524.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
d63c4114c36e73dd975c0cc4a3dc67316e090266f64cd492ec17a7dabcdbe686.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
e1564be8f124041c0c125d9557c302f4631504d0048e1c1f41b6abfb473ebbad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e8a7f5f2b344eb468a91c59dbe8699a08d71f9b708a1134c8948cf194516594b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
e8bf7b5c22a787af15a42638894b8f1eccc3320134f42f09939f4932df0cc796.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
eb214d5f5806ec4617c2b7cde5e3a5beb5a3c254a391dee7605decfe13174bc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
edacb614f4d4ad4a3dd9e9d5ad37ba56d1e7d49ddad0b14ca3ce632b0a820f95.exe
Resource
win10v2004-20240508-en
General
-
Target
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe
-
Size
1.2MB
-
MD5
df37a77942e209ffd551ccbd8a891298
-
SHA1
fdfdc4f2d1a99d36ec9094966b13b9d7f363e64b
-
SHA256
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4
-
SHA512
2d38aacd910db9858c6c5209cdfd373257a9ad9bec99bb442cb9e6107b5c05f1407d19d7f6ec0938c495e69e199dd918aff1eb72f59abc5d2c2a58737c749ce6
-
SSDEEP
24576:VyNl1Y8BGfhfMJ4tpDzfS7+JmYXd4EgielWg:wNlW8GZfxjfKBwJD
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral8/memory/4864-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral8/memory/4864-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral8/memory/4864-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2br075zB.exe family_redline behavioral8/memory/3872-42-0x0000000000210000-0x000000000024E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
UW6FZ3Vl.exedo6RP2hz.exeZP0Kq8zP.exeYq4IH0Xk.exe1GK84On8.exe2br075zB.exepid process 2276 UW6FZ3Vl.exe 2660 do6RP2hz.exe 2172 ZP0Kq8zP.exe 2736 Yq4IH0Xk.exe 4896 1GK84On8.exe 3872 2br075zB.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exeUW6FZ3Vl.exedo6RP2hz.exeZP0Kq8zP.exeYq4IH0Xk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" UW6FZ3Vl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" do6RP2hz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ZP0Kq8zP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Yq4IH0Xk.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1GK84On8.exedescription pid process target process PID 4896 set thread context of 4864 4896 1GK84On8.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4420 4896 WerFault.exe 1GK84On8.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exeUW6FZ3Vl.exedo6RP2hz.exeZP0Kq8zP.exeYq4IH0Xk.exe1GK84On8.exedescription pid process target process PID 368 wrote to memory of 2276 368 8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe UW6FZ3Vl.exe PID 368 wrote to memory of 2276 368 8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe UW6FZ3Vl.exe PID 368 wrote to memory of 2276 368 8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe UW6FZ3Vl.exe PID 2276 wrote to memory of 2660 2276 UW6FZ3Vl.exe do6RP2hz.exe PID 2276 wrote to memory of 2660 2276 UW6FZ3Vl.exe do6RP2hz.exe PID 2276 wrote to memory of 2660 2276 UW6FZ3Vl.exe do6RP2hz.exe PID 2660 wrote to memory of 2172 2660 do6RP2hz.exe ZP0Kq8zP.exe PID 2660 wrote to memory of 2172 2660 do6RP2hz.exe ZP0Kq8zP.exe PID 2660 wrote to memory of 2172 2660 do6RP2hz.exe ZP0Kq8zP.exe PID 2172 wrote to memory of 2736 2172 ZP0Kq8zP.exe Yq4IH0Xk.exe PID 2172 wrote to memory of 2736 2172 ZP0Kq8zP.exe Yq4IH0Xk.exe PID 2172 wrote to memory of 2736 2172 ZP0Kq8zP.exe Yq4IH0Xk.exe PID 2736 wrote to memory of 4896 2736 Yq4IH0Xk.exe 1GK84On8.exe PID 2736 wrote to memory of 4896 2736 Yq4IH0Xk.exe 1GK84On8.exe PID 2736 wrote to memory of 4896 2736 Yq4IH0Xk.exe 1GK84On8.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 4896 wrote to memory of 4864 4896 1GK84On8.exe AppLaunch.exe PID 2736 wrote to memory of 3872 2736 Yq4IH0Xk.exe 2br075zB.exe PID 2736 wrote to memory of 3872 2736 Yq4IH0Xk.exe 2br075zB.exe PID 2736 wrote to memory of 3872 2736 Yq4IH0Xk.exe 2br075zB.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe"C:\Users\Admin\AppData\Local\Temp\8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UW6FZ3Vl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UW6FZ3Vl.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\do6RP2hz.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\do6RP2hz.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP0Kq8zP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP0Kq8zP.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Yq4IH0Xk.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Yq4IH0Xk.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1GK84On8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1GK84On8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 1567⤵
- Program crash
PID:4420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2br075zB.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2br075zB.exe6⤵
- Executes dropped EXE
PID:3872
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4896 -ip 48961⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD527dbb0272a39b749b745624bb236de0e
SHA1c4dd54d96a963c6a013f365152ee77261e1b2f4a
SHA25696bd4482f3b25b52e8fcafa080c44ae713f839fe919e0703a3b62c757da0818f
SHA5127cc1360b2e551421bdcdf647c5a90045147972692f24ea4279fc4a0cb4289c7a002a905538bbc75753722c2e4cfc391f7685c56adef81b563ddecb45d118b4c9
-
Filesize
884KB
MD5564952dc9f3c4f6702e576b07255b0be
SHA1c9bf90a4c67c758c347108c63e53b08f163a483d
SHA2563f3e4d5a68aea2065f6b663b62efcc2da4f04a92f61be54c3f2e0e1a592c4cf6
SHA512aebd37e3fdbfe708a3378a76f1ae4f5b4a9e513d1f5abda6e5de7db544771d65ea9631ddd85fbff3953be61a01d8870885df404410e701ff7a9b810ab779eda3
-
Filesize
590KB
MD5a93ee1614442319766231e3f5bcbc0ba
SHA17db998c834672f5cd42c63bf3b50afcdb8f9fb66
SHA2564698bdfd0a4c4aa8e841025b1a141e47bc9f5049c4aa00a99c7be92ebf84b38d
SHA512887a1c18491f7e4cb69d8adc8d822e697363394b97d4f4ac806bf7872bc73ab6ff92c049299054097688e41e26d9623f6c8c967e6b7b50f256250ceb92865eb0
-
Filesize
417KB
MD587744e4253915431e4801a00475cd769
SHA1e047e13f7fac443feaf654b98fdc1a0d8c6af6bb
SHA2568d5b9755c4f2d24b6bfdceada25f3c1808bf3c8490fbc4cf9935f76f766cbdcc
SHA5127d1cbd26f3907e6035c326caf69e6ce134106d676ac6b8472e8cfd680567f212decd31c485084a1798a2ed678ed28f6cfef218e07237f9237e4e6735c59652ac
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
231KB
MD5954c2366ccd1ffa681067fcb3a3424e8
SHA1c45ed144003d74c7af993061b2397077b4a30265
SHA256efb1c10f218b2deff9f9cf30b11e3cdde35e463dbded71816b7a67d8d545efa6
SHA512e188b8f4b38e686eff0ddac69d138c4ca696c583bafd37e7e1da250c66ff8cc8e59165757223534bb407bf81b7ccb6d399e3200bb3df5ba2610aca2db03966db