Overview
overview
10Static
static
30d17733c30...5d.exe
windows10-2004-x64
1012afd6aace...a7.exe
windows10-2004-x64
101a9919325d...ce.exe
windows10-2004-x64
101b565f7ed3...1d.exe
windows10-2004-x64
102c58ee5805...6e.exe
windows10-2004-x64
1033598ea86e...12.exe
windows10-2004-x64
104e5d421522...cb.exe
windows10-2004-x64
104ff3477e4f...b7.exe
windows10-2004-x64
106ee2a56c58...f5.exe
windows10-2004-x64
10803bdeb4bc...3b.exe
windows10-2004-x64
1082c26e730c...f6.exe
windows10-2004-x64
1092d5779e2c...c1.exe
windows10-2004-x64
10b0845c677f...61.exe
windows10-2004-x64
10b82c1f093a...b3.exe
windows10-2004-x64
10c52f1aa452...c1.exe
windows10-2004-x64
10c7bf16d19a...5c.exe
windows10-2004-x64
10d85805160c...b3.exe
windows10-2004-x64
10e4e49b8568...6d.exe
windows10-2004-x64
10e5ef76e6dd...ba.exe
windows10-2004-x64
10fac8fce7e3...0e.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
12afd6aace975903b46162ca80f43ceaeffd722715cf2a23433c1c09c4bdf7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1a9919325da63b8484a6bd765fb24e43189e13130d5740306b71aac0ea7178ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b565f7ed39bcb3768a8d15009e2ee03870984f6900010642cd696ee9c5efc1d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4ff3477e4f6bd6e3e862b79ae405c63df8d69b707138781208fb58578b8246b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92d5779e2c52f5941931dde42396f724a8986970826adad853ad885da3caccc1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b82c1f093a07f8365a76b180a16ceba720e598167e3d606f93fedc39de6692b3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d85805160cf3294fe4b79968f7cee19fdaf73c0a9ed5ab8fffa11fa7fd3bddb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e4e49b8568937c43bba5621fcfe9e3762efb9c4078b3287603ef249c522d126d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e5ef76e6dd861b064544fe5f0400d8d476e07d29a56f78d564dd2a73252e39ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
Resource
win10v2004-20240226-en
General
-
Target
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
-
Size
1.2MB
-
MD5
3dd8f6854fef67699626058ab40d3f31
-
SHA1
063567df515ff47d7ee1dbc5152aefe9024a6e8e
-
SHA256
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e
-
SHA512
07679ffa6bcea79843d49525a079197b87aa2f9b531a19a72356da9e98516501a21f0aae1c848dc7875e37255c5ec2865ac44a71435e1d3e51b146689d7d60a1
-
SSDEEP
24576:CyUq8WjMVqJf2oLszWLQ023zwJ16iiGwWeN3AikgMLpl4OxQa:pJjMVEf2FWM023zwncWeN3xA74+
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral20/memory/2612-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral20/memory/2612-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral20/memory/2612-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral20/files/0x000700000002327d-40.dat family_redline behavioral20/memory/4560-42-0x0000000000A50000-0x0000000000A8E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4564 qv0HZ8If.exe 3472 Zh0NE0xa.exe 368 rj5UI4Hy.exe 2880 ln5gB9mu.exe 4780 1AD57Uv8.exe 4560 2LS198EB.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" qv0HZ8If.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Zh0NE0xa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" rj5UI4Hy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ln5gB9mu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4780 set thread context of 2612 4780 1AD57Uv8.exe 99 -
Program crash 1 IoCs
pid pid_target Process procid_target 4620 4780 WerFault.exe 95 -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4564 4188 fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe 91 PID 4188 wrote to memory of 4564 4188 fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe 91 PID 4188 wrote to memory of 4564 4188 fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe 91 PID 4564 wrote to memory of 3472 4564 qv0HZ8If.exe 92 PID 4564 wrote to memory of 3472 4564 qv0HZ8If.exe 92 PID 4564 wrote to memory of 3472 4564 qv0HZ8If.exe 92 PID 3472 wrote to memory of 368 3472 Zh0NE0xa.exe 93 PID 3472 wrote to memory of 368 3472 Zh0NE0xa.exe 93 PID 3472 wrote to memory of 368 3472 Zh0NE0xa.exe 93 PID 368 wrote to memory of 2880 368 rj5UI4Hy.exe 94 PID 368 wrote to memory of 2880 368 rj5UI4Hy.exe 94 PID 368 wrote to memory of 2880 368 rj5UI4Hy.exe 94 PID 2880 wrote to memory of 4780 2880 ln5gB9mu.exe 95 PID 2880 wrote to memory of 4780 2880 ln5gB9mu.exe 95 PID 2880 wrote to memory of 4780 2880 ln5gB9mu.exe 95 PID 4780 wrote to memory of 1944 4780 1AD57Uv8.exe 97 PID 4780 wrote to memory of 1944 4780 1AD57Uv8.exe 97 PID 4780 wrote to memory of 1944 4780 1AD57Uv8.exe 97 PID 4780 wrote to memory of 3192 4780 1AD57Uv8.exe 98 PID 4780 wrote to memory of 3192 4780 1AD57Uv8.exe 98 PID 4780 wrote to memory of 3192 4780 1AD57Uv8.exe 98 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 4780 wrote to memory of 2612 4780 1AD57Uv8.exe 99 PID 2880 wrote to memory of 4560 2880 ln5gB9mu.exe 103 PID 2880 wrote to memory of 4560 2880 ln5gB9mu.exe 103 PID 2880 wrote to memory of 4560 2880 ln5gB9mu.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe"C:\Users\Admin\AppData\Local\Temp\fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qv0HZ8If.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qv0HZ8If.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Zh0NE0xa.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Zh0NE0xa.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rj5UI4Hy.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rj5UI4Hy.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ln5gB9mu.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ln5gB9mu.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AD57Uv8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AD57Uv8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 5927⤵
- Program crash
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2LS198EB.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2LS198EB.exe6⤵
- Executes dropped EXE
PID:4560
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4780 -ip 47801⤵PID:3688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5421724b3b04cf59d903e680d1a766b9d
SHA1e67dba336882e8c0913df87c9cb9b810899d097c
SHA25629da8b84b16fc190b6df1772b7daa1fdc5cd34f2bac277222fbd64ddcfdc0011
SHA5121662edf937aab2ce230d1362b13d72c99c13ceecba5c93948a3737c2a7b2d0c6c6869a8c52b99a2def58791a0bc1e0b54db64a981d0c781fbb4980c870444f0b
-
Filesize
878KB
MD5eec8eb6e512d020b86cd3ae6b09bce8a
SHA12ac3ddcca7f88e978028b46757783b60a7dc8e8f
SHA2567be7783b69491f75e1dfd11e06bd8338543b1a65d7bc7576c7e171d349b020af
SHA512cbdb244f6dafc6de5f5e67daa557934839095b704dbcd0ca7d160124bc66edd73a3923d6ea7d23cdd97e90ad259be6ed91c95846618dff3939125ae88ece75b7
-
Filesize
584KB
MD55dbe56050d97c6522d37ed730065cc18
SHA17a5d90cda04bb324e06e58bd7558a8785f39ea30
SHA256614d5d3b560bed426a2725ca08410b0d1c055d9b1edde5c7e48f0d9635587ec9
SHA5129f689afb24e46864ede2c6dd7f970c0130035fcd009e4c3f5944c7a8bb6827c48503de21eba88d39c19f13f1b3a0fa13b163c7b8274900d41048c1f805ce9b19
-
Filesize
412KB
MD5b8cb540a578f232a290b557f8670ee6f
SHA1d4163893a566b6d1f8cac693c8bfb8bb69c86fcf
SHA2563cf95466757cf38ec2626f95a2a296d9dedaa4c0957f74ae1fee51bd20782239
SHA512ffa67ee216d11131afde10909f10756a08429cd841b52b3f753dace98e360e8d33a7c9ce0d50bcd5f7f1c3a50917bbb9f151ca7bf51553b8d4ccac6c9f314b3b
-
Filesize
378KB
MD541989dfc3f7c36881a197de5c3fbe49e
SHA18e5a7a040938b00af293038decd9b680ad53f9b3
SHA2561bf18819c586f189d900d3cc7a251702a7c80f1b35717c8eedc4fd7243d4313b
SHA512fcbc8cd96840b8d27decc46d33f668407080cd104da9387100f8a200dcae9b7145f1455cafc1e6b81e599af7dd111c7d63e03c05e25f832fb86837a83126dd54
-
Filesize
221KB
MD59bb44e94db4192011c80db7d4c4a3229
SHA1dc345692e3723796692456f0fd46934df6533011
SHA256acd646257837774c57f84737190332cdd8cf56fbf881b896dcefc8a4ee0770dd
SHA51254d3ed04e280304e9fd783ddf0b538945137c6f0f5dde500cea9428f6e1ee6a963d55eb279a855822fc9fcbff96e77586796b6d61079e2ad4fa9945a0f29e676