Overview
overview
10Static
static
30d17733c30...5d.exe
windows10-2004-x64
1012afd6aace...a7.exe
windows10-2004-x64
101a9919325d...ce.exe
windows10-2004-x64
101b565f7ed3...1d.exe
windows10-2004-x64
102c58ee5805...6e.exe
windows10-2004-x64
1033598ea86e...12.exe
windows10-2004-x64
104e5d421522...cb.exe
windows10-2004-x64
104ff3477e4f...b7.exe
windows10-2004-x64
106ee2a56c58...f5.exe
windows10-2004-x64
10803bdeb4bc...3b.exe
windows10-2004-x64
1082c26e730c...f6.exe
windows10-2004-x64
1092d5779e2c...c1.exe
windows10-2004-x64
10b0845c677f...61.exe
windows10-2004-x64
10b82c1f093a...b3.exe
windows10-2004-x64
10c52f1aa452...c1.exe
windows10-2004-x64
10c7bf16d19a...5c.exe
windows10-2004-x64
10d85805160c...b3.exe
windows10-2004-x64
10e4e49b8568...6d.exe
windows10-2004-x64
10e5ef76e6dd...ba.exe
windows10-2004-x64
10fac8fce7e3...0e.exe
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
12afd6aace975903b46162ca80f43ceaeffd722715cf2a23433c1c09c4bdf7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1a9919325da63b8484a6bd765fb24e43189e13130d5740306b71aac0ea7178ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b565f7ed39bcb3768a8d15009e2ee03870984f6900010642cd696ee9c5efc1d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4ff3477e4f6bd6e3e862b79ae405c63df8d69b707138781208fb58578b8246b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92d5779e2c52f5941931dde42396f724a8986970826adad853ad885da3caccc1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b82c1f093a07f8365a76b180a16ceba720e598167e3d606f93fedc39de6692b3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d85805160cf3294fe4b79968f7cee19fdaf73c0a9ed5ab8fffa11fa7fd3bddb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e4e49b8568937c43bba5621fcfe9e3762efb9c4078b3287603ef249c522d126d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e5ef76e6dd861b064544fe5f0400d8d476e07d29a56f78d564dd2a73252e39ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
Resource
win10v2004-20240226-en
General
-
Target
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
-
Size
1.2MB
-
MD5
dc9b74f110010f383b089951fffa25a6
-
SHA1
64b60b766c56ceef8caeb825d984a3a1fee901aa
-
SHA256
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c
-
SHA512
6e00b0e9c0451d9aad2715074ebb18a2000b62dca1846cfcbb2d6bb8a372ad97a6f0bb2f51fce43e97f977b7e70876e58133acd2c3fa4f62717c91bbd042ba33
-
SSDEEP
24576:0yPClHm/RqsNjI8rN9OvEDOLRlb/3K1WRQIGMH2RVTecm+XRbvU:DKlG8sN9nC9NlbfKa1H2zJX9
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral16/memory/3464-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral16/memory/3464-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral16/memory/3464-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lg438Wc.exe family_redline behavioral16/memory/1232-42-0x0000000000AE0000-0x0000000000B1E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
Id7Qx6xD.exent8ae2mY.exeKN1QV7kB.exeZm4wm3pa.exe1xx85nk3.exe2Lg438Wc.exepid process 1592 Id7Qx6xD.exe 2748 nt8ae2mY.exe 1020 KN1QV7kB.exe 6100 Zm4wm3pa.exe 5388 1xx85nk3.exe 1232 2Lg438Wc.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exeId7Qx6xD.exent8ae2mY.exeKN1QV7kB.exeZm4wm3pa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Id7Qx6xD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nt8ae2mY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" KN1QV7kB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Zm4wm3pa.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1xx85nk3.exedescription pid process target process PID 5388 set thread context of 3464 5388 1xx85nk3.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2144 5388 WerFault.exe 1xx85nk3.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exeId7Qx6xD.exent8ae2mY.exeKN1QV7kB.exeZm4wm3pa.exe1xx85nk3.exedescription pid process target process PID 5728 wrote to memory of 1592 5728 c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe Id7Qx6xD.exe PID 5728 wrote to memory of 1592 5728 c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe Id7Qx6xD.exe PID 5728 wrote to memory of 1592 5728 c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe Id7Qx6xD.exe PID 1592 wrote to memory of 2748 1592 Id7Qx6xD.exe nt8ae2mY.exe PID 1592 wrote to memory of 2748 1592 Id7Qx6xD.exe nt8ae2mY.exe PID 1592 wrote to memory of 2748 1592 Id7Qx6xD.exe nt8ae2mY.exe PID 2748 wrote to memory of 1020 2748 nt8ae2mY.exe KN1QV7kB.exe PID 2748 wrote to memory of 1020 2748 nt8ae2mY.exe KN1QV7kB.exe PID 2748 wrote to memory of 1020 2748 nt8ae2mY.exe KN1QV7kB.exe PID 1020 wrote to memory of 6100 1020 KN1QV7kB.exe Zm4wm3pa.exe PID 1020 wrote to memory of 6100 1020 KN1QV7kB.exe Zm4wm3pa.exe PID 1020 wrote to memory of 6100 1020 KN1QV7kB.exe Zm4wm3pa.exe PID 6100 wrote to memory of 5388 6100 Zm4wm3pa.exe 1xx85nk3.exe PID 6100 wrote to memory of 5388 6100 Zm4wm3pa.exe 1xx85nk3.exe PID 6100 wrote to memory of 5388 6100 Zm4wm3pa.exe 1xx85nk3.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 5388 wrote to memory of 3464 5388 1xx85nk3.exe AppLaunch.exe PID 6100 wrote to memory of 1232 6100 Zm4wm3pa.exe 2Lg438Wc.exe PID 6100 wrote to memory of 1232 6100 Zm4wm3pa.exe 2Lg438Wc.exe PID 6100 wrote to memory of 1232 6100 Zm4wm3pa.exe 2Lg438Wc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe"C:\Users\Admin\AppData\Local\Temp\c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Id7Qx6xD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Id7Qx6xD.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nt8ae2mY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nt8ae2mY.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\KN1QV7kB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\KN1QV7kB.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Zm4wm3pa.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Zm4wm3pa.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:6100 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1xx85nk3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1xx85nk3.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5388 -s 5927⤵
- Program crash
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lg438Wc.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lg438Wc.exe6⤵
- Executes dropped EXE
PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5388 -ip 53881⤵PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD52915043c840f44d3d194fe1d187bd830
SHA168952a46a2911fe8e4ef0e4a71defe63a26f4a60
SHA25627d8069284dbed6f8674f85ef84f65270311b3955464664d790589e6001ec917
SHA5123ff90aac7a77ac9c381160c250d294f7ecc86979e3a6dc27d393263ac1140236549010f970d1d6c274d8667e17c994e4692e98b6327a1390a6ff73ffd7a3dd80
-
Filesize
878KB
MD5705469b3d149cffb1d963ab2d279e715
SHA1dbff86ea579a30049f9a2d8cc0548ffb70787abc
SHA25685c4e1d89fa3f1ea0b1d51c0f6a54650688cbb25b225dcd053589b36a9699136
SHA512ae68b59d965e063ee461ba2209cf7110df5f5160adbe6ae2c0bb11b95fffffb7f2d24f316a85839b5026906d99ff8c286aa9d0425508cef8578440f478c3409d
-
Filesize
584KB
MD50add6a19f1ff447f8a22f4d91c8cc638
SHA1094efea1eef56f8d9d4e72cc379b670a10f3932d
SHA256e063bce632dc135876a27490a271936c15a052934d726ec7576c9c2101cc7fde
SHA51217410c72838d51433e1a0d5ea52d89d810fb343e25be300b1fba0aceb15f5951009e5f1fd610c12027f20758675e52111cd4556a731ee410bf616582461d67f7
-
Filesize
412KB
MD508b49c63669ef42d3595cf6a6892b2c4
SHA10a0ade1b847f6d8b18714338cc9635873dafbd6e
SHA2560390274e46d678d2e17fc7ad1584f8e80c29d2266a06cb69a33d8d10a820701e
SHA512c323951b4401001765ee0287d8b014bd9eb8f3e2d45783649d41d5b230ece6c6c5e6a411938a3bf484d1c155df008dc61adbb23edb952b7bb8fa2da33b8ac262
-
Filesize
378KB
MD586b7b551e32d4d5ace605126db5363a5
SHA1800cbccf5a9784d576f0b118a2d2f5014a21b03b
SHA2561abd730d0a582af55ebfe4ba177eb3ca1252c06638e66e45a51320d8b58d8a72
SHA51277ec61c1de3aa9be2b49662256f6bfb479eedea848b0a29a4f1ad7f1495cb5ddbd4dab4c0d4822fcf1a56d1af95625eefc7782e86ad3b96e3872c7a2a85a9e29
-
Filesize
221KB
MD597b8ee19628a60c8656c653840c584eb
SHA171179bf72658adc1df55928b763c533baf0d27ca
SHA256a8f4959931614764afaf30191036a8ebe37b60e383bda2f481aa2c0f119be119
SHA51299dab928335004c29c3cd323aafa6986bbec5a6e3fbe634806f7179c6ac80837e8b246e1f3eaa62a3328a98ddf839e04661e740cb907024d009318bdbc972c53