Overview
overview
10Static
static
30d17733c30...5d.exe
windows10-2004-x64
1012afd6aace...a7.exe
windows10-2004-x64
101a9919325d...ce.exe
windows10-2004-x64
101b565f7ed3...1d.exe
windows10-2004-x64
102c58ee5805...6e.exe
windows10-2004-x64
1033598ea86e...12.exe
windows10-2004-x64
104e5d421522...cb.exe
windows10-2004-x64
104ff3477e4f...b7.exe
windows10-2004-x64
106ee2a56c58...f5.exe
windows10-2004-x64
10803bdeb4bc...3b.exe
windows10-2004-x64
1082c26e730c...f6.exe
windows10-2004-x64
1092d5779e2c...c1.exe
windows10-2004-x64
10b0845c677f...61.exe
windows10-2004-x64
10b82c1f093a...b3.exe
windows10-2004-x64
10c52f1aa452...c1.exe
windows10-2004-x64
10c7bf16d19a...5c.exe
windows10-2004-x64
10d85805160c...b3.exe
windows10-2004-x64
10e4e49b8568...6d.exe
windows10-2004-x64
10e5ef76e6dd...ba.exe
windows10-2004-x64
10fac8fce7e3...0e.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
12afd6aace975903b46162ca80f43ceaeffd722715cf2a23433c1c09c4bdf7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1a9919325da63b8484a6bd765fb24e43189e13130d5740306b71aac0ea7178ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b565f7ed39bcb3768a8d15009e2ee03870984f6900010642cd696ee9c5efc1d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4ff3477e4f6bd6e3e862b79ae405c63df8d69b707138781208fb58578b8246b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92d5779e2c52f5941931dde42396f724a8986970826adad853ad885da3caccc1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b82c1f093a07f8365a76b180a16ceba720e598167e3d606f93fedc39de6692b3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d85805160cf3294fe4b79968f7cee19fdaf73c0a9ed5ab8fffa11fa7fd3bddb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e4e49b8568937c43bba5621fcfe9e3762efb9c4078b3287603ef249c522d126d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e5ef76e6dd861b064544fe5f0400d8d476e07d29a56f78d564dd2a73252e39ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
Resource
win10v2004-20240226-en
General
-
Target
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
-
Size
1.2MB
-
MD5
ffe7a227d672738c32a358a57cec260a
-
SHA1
510db6cee62d02c4c7c9dad24943bd3f750d7f93
-
SHA256
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1
-
SHA512
5080a0d9e79b757d9892e672291f0124d852fda2be1305f26cebd6c8e1df7c9aeb03a1e76709980aa0c07542f6ba0f2249a1a859bf31d8060bb20635375b598a
-
SSDEEP
24576:AyrJFM73gR6RI52yQFjnzwgLS/+wkc+Qv+hUbW5:HNFM70El0gLS+PQ5W
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral15/memory/3340-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral15/memory/3340-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral15/memory/3340-37-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2tD143sI.exe family_redline behavioral15/memory/4564-42-0x0000000000180000-0x00000000001BE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
WQ4sg2Gq.exeZC5pC5Xb.exeGx6DA6Dl.exenW6fu3Dj.exe1oA20VV8.exe2tD143sI.exepid process 3748 WQ4sg2Gq.exe 4312 ZC5pC5Xb.exe 1284 Gx6DA6Dl.exe 3372 nW6fu3Dj.exe 4244 1oA20VV8.exe 4564 2tD143sI.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exeWQ4sg2Gq.exeZC5pC5Xb.exeGx6DA6Dl.exenW6fu3Dj.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" WQ4sg2Gq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ZC5pC5Xb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Gx6DA6Dl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" nW6fu3Dj.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1oA20VV8.exedescription pid process target process PID 4244 set thread context of 3340 4244 1oA20VV8.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1432 4244 WerFault.exe 1oA20VV8.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exeWQ4sg2Gq.exeZC5pC5Xb.exeGx6DA6Dl.exenW6fu3Dj.exe1oA20VV8.exedescription pid process target process PID 2072 wrote to memory of 3748 2072 c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe WQ4sg2Gq.exe PID 2072 wrote to memory of 3748 2072 c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe WQ4sg2Gq.exe PID 2072 wrote to memory of 3748 2072 c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe WQ4sg2Gq.exe PID 3748 wrote to memory of 4312 3748 WQ4sg2Gq.exe ZC5pC5Xb.exe PID 3748 wrote to memory of 4312 3748 WQ4sg2Gq.exe ZC5pC5Xb.exe PID 3748 wrote to memory of 4312 3748 WQ4sg2Gq.exe ZC5pC5Xb.exe PID 4312 wrote to memory of 1284 4312 ZC5pC5Xb.exe Gx6DA6Dl.exe PID 4312 wrote to memory of 1284 4312 ZC5pC5Xb.exe Gx6DA6Dl.exe PID 4312 wrote to memory of 1284 4312 ZC5pC5Xb.exe Gx6DA6Dl.exe PID 1284 wrote to memory of 3372 1284 Gx6DA6Dl.exe nW6fu3Dj.exe PID 1284 wrote to memory of 3372 1284 Gx6DA6Dl.exe nW6fu3Dj.exe PID 1284 wrote to memory of 3372 1284 Gx6DA6Dl.exe nW6fu3Dj.exe PID 3372 wrote to memory of 4244 3372 nW6fu3Dj.exe 1oA20VV8.exe PID 3372 wrote to memory of 4244 3372 nW6fu3Dj.exe 1oA20VV8.exe PID 3372 wrote to memory of 4244 3372 nW6fu3Dj.exe 1oA20VV8.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 4244 wrote to memory of 3340 4244 1oA20VV8.exe AppLaunch.exe PID 3372 wrote to memory of 4564 3372 nW6fu3Dj.exe 2tD143sI.exe PID 3372 wrote to memory of 4564 3372 nW6fu3Dj.exe 2tD143sI.exe PID 3372 wrote to memory of 4564 3372 nW6fu3Dj.exe 2tD143sI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe"C:\Users\Admin\AppData\Local\Temp\c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WQ4sg2Gq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WQ4sg2Gq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZC5pC5Xb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZC5pC5Xb.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Gx6DA6Dl.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Gx6DA6Dl.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nW6fu3Dj.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nW6fu3Dj.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1oA20VV8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1oA20VV8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 5927⤵
- Program crash
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2tD143sI.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2tD143sI.exe6⤵
- Executes dropped EXE
PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4244 -ip 42441⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5b9cfcc60817c8121977e71ee8c6aebd9
SHA1ced1e9401ddee75a63c1adeeb1ae3bd072702f1d
SHA25612166e655475465188552c5503a8d8e5db50d4812b0582d3bd020eb20d5da373
SHA512c95027be495067c1c39e4ffd950aa113d4a4de23939fcac8264d9c02f07eca691a43a6937b61b0cdf4c0d835487c0b18cafeeca2786f62b2de4d4ebbe2a60b2e
-
Filesize
884KB
MD53a6538c6c794a8776591c48d4d347f44
SHA12831c8594e8455f289b4de7e8e7110f0227defdc
SHA256ee5c3274f5b30bb85e429a54681d54a0841d8244c2644e0a7b30427fb347d03e
SHA512aa1af6f2b6cdc8e5d42577f24b6e0e9ebc50847f635eb0004a17852b274f4bd1156809f930e37610780063f7f5eb20c8fd752ba5e9fa6f4cb7449fb89af4d9f5
-
Filesize
590KB
MD5aec2a6ad8432b23e6caea51b4f676d3f
SHA147b7b07b86b6b3b165f00bde02bc38d7a94e2d90
SHA2560c9a20791a0dc9a4a77b2a598c0797583528e60e8caa40172a3b829fcd6d9cc4
SHA5125f2aed8e5cee75baaccbd98366cbc1abc9a54b590a47de26f7d9ef61721cfb3a7bd804a0ba1619703eba99af49ae858d5825842925b5ae74c78ac5db1a2aa226
-
Filesize
417KB
MD508e301a84cf495a48b0bcf65bef50534
SHA170f4fecdd000a98aab48f5640b9fe6eafee98226
SHA2563bf26fe604efcb027de085c469a520483fd73f09ef2d53650d56768847b857aa
SHA51241ea61ebfdbfdb17b08bfa24b7691def1177f82560fbf69c2cc533bd7a63398acde07766d9f980f667f4149951bf53319f4ab330cd948ef750a7f9465e689e82
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
231KB
MD5e4fbfa85365d7d406f20a94b2de975d4
SHA16e828d088d936f3497b12507a8aca862e3167be9
SHA2565233eb436934c081c6061ee05a0ec1fb6f6214ebf140f35b54c4ac759f4b093b
SHA512230ad7f8535a9a0f80a06fdd136acc5b2d389ea1ca23cddaea04c151812dcc515bd2972f32b3d8a7c47cc166bc48e200e8720ad9396cab666d1b3da33ef34bdc