Overview
overview
10Static
static
30d17733c30...5d.exe
windows10-2004-x64
1012afd6aace...a7.exe
windows10-2004-x64
101a9919325d...ce.exe
windows10-2004-x64
101b565f7ed3...1d.exe
windows10-2004-x64
102c58ee5805...6e.exe
windows10-2004-x64
1033598ea86e...12.exe
windows10-2004-x64
104e5d421522...cb.exe
windows10-2004-x64
104ff3477e4f...b7.exe
windows10-2004-x64
106ee2a56c58...f5.exe
windows10-2004-x64
10803bdeb4bc...3b.exe
windows10-2004-x64
1082c26e730c...f6.exe
windows10-2004-x64
1092d5779e2c...c1.exe
windows10-2004-x64
10b0845c677f...61.exe
windows10-2004-x64
10b82c1f093a...b3.exe
windows10-2004-x64
10c52f1aa452...c1.exe
windows10-2004-x64
10c7bf16d19a...5c.exe
windows10-2004-x64
10d85805160c...b3.exe
windows10-2004-x64
10e4e49b8568...6d.exe
windows10-2004-x64
10e5ef76e6dd...ba.exe
windows10-2004-x64
10fac8fce7e3...0e.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
12afd6aace975903b46162ca80f43ceaeffd722715cf2a23433c1c09c4bdf7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1a9919325da63b8484a6bd765fb24e43189e13130d5740306b71aac0ea7178ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b565f7ed39bcb3768a8d15009e2ee03870984f6900010642cd696ee9c5efc1d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4ff3477e4f6bd6e3e862b79ae405c63df8d69b707138781208fb58578b8246b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92d5779e2c52f5941931dde42396f724a8986970826adad853ad885da3caccc1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b82c1f093a07f8365a76b180a16ceba720e598167e3d606f93fedc39de6692b3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d85805160cf3294fe4b79968f7cee19fdaf73c0a9ed5ab8fffa11fa7fd3bddb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e4e49b8568937c43bba5621fcfe9e3762efb9c4078b3287603ef249c522d126d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e5ef76e6dd861b064544fe5f0400d8d476e07d29a56f78d564dd2a73252e39ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
Resource
win10v2004-20240226-en
General
-
Target
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
-
Size
272KB
-
MD5
b377b3cf4944e110382a96968449d034
-
SHA1
e38952501c935164ef7ef9c2fb33341936db56bb
-
SHA256
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb
-
SHA512
b645b3690772419b94de5d2cc2910c415700f2ce2e0a7718b3db7d0c02513f9ea21309aef959dc263c6c2ff3b0937e20eaca1d32560ae22165382d44f91a0153
-
SSDEEP
6144:Kay+bnr+4p0yN90QEZd3Y9nO/kYSyZWBCpeUcmOpmL:2Mr8y90Tdo9nOvkCFq6
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral7/files/0x0008000000023435-5.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x0007000000023436-8.dat family_redline behavioral7/memory/3516-11-0x0000000000D80000-0x0000000000DB0000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 1628 m9337626.exe 3516 n2328537.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1628 3452 4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe 83 PID 3452 wrote to memory of 1628 3452 4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe 83 PID 3452 wrote to memory of 1628 3452 4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe 83 PID 3452 wrote to memory of 3516 3452 4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe 84 PID 3452 wrote to memory of 3516 3452 4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe 84 PID 3452 wrote to memory of 3516 3452 4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe"C:\Users\Admin\AppData\Local\Temp\4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9337626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9337626.exe2⤵
- Executes dropped EXE
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2328537.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2328537.exe2⤵
- Executes dropped EXE
PID:3516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5ec04ee1a38cd40fffaa88c9137ef0e93
SHA1f491a9f9a2f2f9675a15263541a53131c83397d8
SHA2564a3f6d64f9a7d57ec307a5ab973dff980df0f64595b1de131ac58302336982ae
SHA512c5eca5fc21313405de4e32958cf4c320d540523df6f6b4f5aa4cc90e81fd86a234f4011389b173c23f434dcfd7b18482af7ddaacbfa41f830d3d8cdaa83d2d23
-
Filesize
174KB
MD5429faac50ef94d3699d61066fd94ddc5
SHA1e3812a0cefca639cc61f9d4cdf9a87c25d33e858
SHA2567f9c4f6f04b28b3b3c4953330e2097054161faa08ca25d654f17cfa3da2274a3
SHA5121a4b84cc96c66b6363790f1cb67fe7730f5a6e19a442319daa179e1728e5baac0dcc0b8e275cf1b6527f424748028ea626939856b03715a07127c62ea36725d3