Overview
overview
10Static
static
30d17733c30...5d.exe
windows10-2004-x64
1012afd6aace...a7.exe
windows10-2004-x64
101a9919325d...ce.exe
windows10-2004-x64
101b565f7ed3...1d.exe
windows10-2004-x64
102c58ee5805...6e.exe
windows10-2004-x64
1033598ea86e...12.exe
windows10-2004-x64
104e5d421522...cb.exe
windows10-2004-x64
104ff3477e4f...b7.exe
windows10-2004-x64
106ee2a56c58...f5.exe
windows10-2004-x64
10803bdeb4bc...3b.exe
windows10-2004-x64
1082c26e730c...f6.exe
windows10-2004-x64
1092d5779e2c...c1.exe
windows10-2004-x64
10b0845c677f...61.exe
windows10-2004-x64
10b82c1f093a...b3.exe
windows10-2004-x64
10c52f1aa452...c1.exe
windows10-2004-x64
10c7bf16d19a...5c.exe
windows10-2004-x64
10d85805160c...b3.exe
windows10-2004-x64
10e4e49b8568...6d.exe
windows10-2004-x64
10e5ef76e6dd...ba.exe
windows10-2004-x64
10fac8fce7e3...0e.exe
windows10-2004-x64
10Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
12afd6aace975903b46162ca80f43ceaeffd722715cf2a23433c1c09c4bdf7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1a9919325da63b8484a6bd765fb24e43189e13130d5740306b71aac0ea7178ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b565f7ed39bcb3768a8d15009e2ee03870984f6900010642cd696ee9c5efc1d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4ff3477e4f6bd6e3e862b79ae405c63df8d69b707138781208fb58578b8246b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92d5779e2c52f5941931dde42396f724a8986970826adad853ad885da3caccc1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b82c1f093a07f8365a76b180a16ceba720e598167e3d606f93fedc39de6692b3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d85805160cf3294fe4b79968f7cee19fdaf73c0a9ed5ab8fffa11fa7fd3bddb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e4e49b8568937c43bba5621fcfe9e3762efb9c4078b3287603ef249c522d126d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e5ef76e6dd861b064544fe5f0400d8d476e07d29a56f78d564dd2a73252e39ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
Resource
win10v2004-20240226-en
General
-
Target
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
-
Size
631KB
-
MD5
02a6385cadccaae01686ff068e1019e7
-
SHA1
409d5af29477ee6436c37917b567ae4e10fad5c0
-
SHA256
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061
-
SHA512
744b153ddf945f75399e44bbdce8a3cfc3b1af8050a9e667c503b705adc609db8db79603300c46bcdf6afa6b6a4b47a475b16cc57f7af0df78294d3732de7bcc
-
SSDEEP
12288:YMrVy90ob0MnsCU2toDypXWVm218sXdx2gVQDOM/b+w:dyPogZqDy1WHP3VQDOMz3
Malware Config
Extracted
redline
jokes
77.91.124.82:19071
-
auth_value
fb7b36b70ae30fb2b72f789037350cdb
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral13/files/0x0008000000023456-20.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral13/files/0x0007000000023457-22.dat family_redline behavioral13/memory/3404-24-0x00000000001C0000-0x00000000001F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4872 y0821680.exe 3148 y4164106.exe 3176 m1123121.exe 3404 n8191002.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0821680.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4164106.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 940 wrote to memory of 4872 940 b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe 83 PID 940 wrote to memory of 4872 940 b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe 83 PID 940 wrote to memory of 4872 940 b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe 83 PID 4872 wrote to memory of 3148 4872 y0821680.exe 84 PID 4872 wrote to memory of 3148 4872 y0821680.exe 84 PID 4872 wrote to memory of 3148 4872 y0821680.exe 84 PID 3148 wrote to memory of 3176 3148 y4164106.exe 85 PID 3148 wrote to memory of 3176 3148 y4164106.exe 85 PID 3148 wrote to memory of 3176 3148 y4164106.exe 85 PID 3148 wrote to memory of 3404 3148 y4164106.exe 86 PID 3148 wrote to memory of 3404 3148 y4164106.exe 86 PID 3148 wrote to memory of 3404 3148 y4164106.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe"C:\Users\Admin\AppData\Local\Temp\b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0821680.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0821680.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4164106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4164106.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m1123121.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m1123121.exe4⤵
- Executes dropped EXE
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n8191002.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n8191002.exe4⤵
- Executes dropped EXE
PID:3404
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD5c4ef82bf9146dba1ac57af69fa171ec4
SHA125bc458a4f8e27ee8843452d882a56273ddbcaf3
SHA25603fb8e879271f1a778b2b337fe606d74946f7bb5af8167710f06027b0d4e6014
SHA512efce5ca82546aabe1572797de3098654f08a12b2abc982e0084a3e8c18e9386aed6431dce28ffd6244f178879ed485eb19e3ff6b8fcdad67dbd3f4b6f1d1f383
-
Filesize
271KB
MD5a784c6700f6328fba461904ae0899cd3
SHA12056c365ebdb83e75c171e8562969695b3d35313
SHA2561777dd86cfc93b80776acc6181e382dbb4e4a79f1dbdfffa03d8427e56fe1e30
SHA512434fcf070841b5d35d9eb1fe499020ef291607a046a926b8ca5d3f926a6b0ad9414d772978e216e835c8683bbb6b68748e6b6c879af7998798829623adc6900a
-
Filesize
140KB
MD5ab69f362d44403dc240dc3aa887eb8d2
SHA13a8ab030886a2f5d876337c1e02f8e6c866b5ac3
SHA2565843114a10718017c2bc777f1b26ab82c1fab55ad2ef2f3c16a90bdd5ad17923
SHA5125f6c21b20245b67cc89dda670af03292aecc46f00400804b4770178007de4c16e0b0ece4ec128e74d320faf9edfa07f55893e30f1d20e89169b5938e74867f04
-
Filesize
174KB
MD56aa320f8d3db292e485cd0ce078a524c
SHA1966856b80c18ce605e8dc9539584bc68915b9ce7
SHA256c577aa03db9df7ad1b553ce8f960986ea1f604135ebe3c8cc0617bd883770145
SHA512f1e4008311ead2ad87dcfce95325e2ed4cfccc040af4a8c2d4d6bebb97b07d1d08341fd82929bb34b1af3869db75e001ebb91a1ef43dc43fcbdcd8dbe5a2d77c