Overview
overview
10Static
static
30d17733c30...5d.exe
windows10-2004-x64
1012afd6aace...a7.exe
windows10-2004-x64
101a9919325d...ce.exe
windows10-2004-x64
101b565f7ed3...1d.exe
windows10-2004-x64
102c58ee5805...6e.exe
windows10-2004-x64
1033598ea86e...12.exe
windows10-2004-x64
104e5d421522...cb.exe
windows10-2004-x64
104ff3477e4f...b7.exe
windows10-2004-x64
106ee2a56c58...f5.exe
windows10-2004-x64
10803bdeb4bc...3b.exe
windows10-2004-x64
1082c26e730c...f6.exe
windows10-2004-x64
1092d5779e2c...c1.exe
windows10-2004-x64
10b0845c677f...61.exe
windows10-2004-x64
10b82c1f093a...b3.exe
windows10-2004-x64
10c52f1aa452...c1.exe
windows10-2004-x64
10c7bf16d19a...5c.exe
windows10-2004-x64
10d85805160c...b3.exe
windows10-2004-x64
10e4e49b8568...6d.exe
windows10-2004-x64
10e5ef76e6dd...ba.exe
windows10-2004-x64
10fac8fce7e3...0e.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
12afd6aace975903b46162ca80f43ceaeffd722715cf2a23433c1c09c4bdf7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1a9919325da63b8484a6bd765fb24e43189e13130d5740306b71aac0ea7178ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b565f7ed39bcb3768a8d15009e2ee03870984f6900010642cd696ee9c5efc1d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4ff3477e4f6bd6e3e862b79ae405c63df8d69b707138781208fb58578b8246b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92d5779e2c52f5941931dde42396f724a8986970826adad853ad885da3caccc1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b82c1f093a07f8365a76b180a16ceba720e598167e3d606f93fedc39de6692b3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d85805160cf3294fe4b79968f7cee19fdaf73c0a9ed5ab8fffa11fa7fd3bddb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e4e49b8568937c43bba5621fcfe9e3762efb9c4078b3287603ef249c522d126d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e5ef76e6dd861b064544fe5f0400d8d476e07d29a56f78d564dd2a73252e39ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
Resource
win10v2004-20240226-en
General
-
Target
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
-
Size
991KB
-
MD5
6ef947676fa334d38379a2fda493b8a5
-
SHA1
4ee6dcca6bbf609046e66bc82040246ae7c0250f
-
SHA256
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5
-
SHA512
2ec1e0e21e461c621a933476897e0bba7d635e6509f32bf0afd614fd37b0dfe76c2595b165fcb29954358a3a25b9ddb151e0d8e4e28ec8c2f638d55ce594e185
-
SSDEEP
24576:SyMWu2HJLjK0CSP55myltVEu0v/ciz7dh:5E2HljCi55fFEu0v0k
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral9/memory/2984-56-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral9/memory/2984-59-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral9/memory/2984-57-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1bC97nU3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1bC97nU3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1bC97nU3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1bC97nU3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1bC97nU3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1bC97nU3.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral9/memory/4328-67-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 4660 oo8Nr58.exe 2728 Yl4TJ91.exe 5040 1bC97nU3.exe 2500 2FU6609.exe 3508 3Ps69La.exe 2688 4yC662Hw.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1bC97nU3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1bC97nU3.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" oo8Nr58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Yl4TJ91.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2500 set thread context of 2984 2500 2FU6609.exe 97 PID 3508 set thread context of 4064 3508 3Ps69La.exe 104 PID 2688 set thread context of 4328 2688 4yC662Hw.exe 109 -
Program crash 3 IoCs
pid pid_target Process procid_target 3848 2500 WerFault.exe 95 540 3508 WerFault.exe 101 692 2688 WerFault.exe 107 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5040 1bC97nU3.exe 5040 1bC97nU3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5040 1bC97nU3.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4660 4376 6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe 83 PID 4376 wrote to memory of 4660 4376 6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe 83 PID 4376 wrote to memory of 4660 4376 6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe 83 PID 4660 wrote to memory of 2728 4660 oo8Nr58.exe 84 PID 4660 wrote to memory of 2728 4660 oo8Nr58.exe 84 PID 4660 wrote to memory of 2728 4660 oo8Nr58.exe 84 PID 2728 wrote to memory of 5040 2728 Yl4TJ91.exe 85 PID 2728 wrote to memory of 5040 2728 Yl4TJ91.exe 85 PID 2728 wrote to memory of 5040 2728 Yl4TJ91.exe 85 PID 2728 wrote to memory of 2500 2728 Yl4TJ91.exe 95 PID 2728 wrote to memory of 2500 2728 Yl4TJ91.exe 95 PID 2728 wrote to memory of 2500 2728 Yl4TJ91.exe 95 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 2500 wrote to memory of 2984 2500 2FU6609.exe 97 PID 4660 wrote to memory of 3508 4660 oo8Nr58.exe 101 PID 4660 wrote to memory of 3508 4660 oo8Nr58.exe 101 PID 4660 wrote to memory of 3508 4660 oo8Nr58.exe 101 PID 3508 wrote to memory of 1884 3508 3Ps69La.exe 103 PID 3508 wrote to memory of 1884 3508 3Ps69La.exe 103 PID 3508 wrote to memory of 1884 3508 3Ps69La.exe 103 PID 3508 wrote to memory of 4064 3508 3Ps69La.exe 104 PID 3508 wrote to memory of 4064 3508 3Ps69La.exe 104 PID 3508 wrote to memory of 4064 3508 3Ps69La.exe 104 PID 3508 wrote to memory of 4064 3508 3Ps69La.exe 104 PID 3508 wrote to memory of 4064 3508 3Ps69La.exe 104 PID 3508 wrote to memory of 4064 3508 3Ps69La.exe 104 PID 4376 wrote to memory of 2688 4376 6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe 107 PID 4376 wrote to memory of 2688 4376 6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe 107 PID 4376 wrote to memory of 2688 4376 6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe 107 PID 2688 wrote to memory of 4328 2688 4yC662Hw.exe 109 PID 2688 wrote to memory of 4328 2688 4yC662Hw.exe 109 PID 2688 wrote to memory of 4328 2688 4yC662Hw.exe 109 PID 2688 wrote to memory of 4328 2688 4yC662Hw.exe 109 PID 2688 wrote to memory of 4328 2688 4yC662Hw.exe 109 PID 2688 wrote to memory of 4328 2688 4yC662Hw.exe 109 PID 2688 wrote to memory of 4328 2688 4yC662Hw.exe 109 PID 2688 wrote to memory of 4328 2688 4yC662Hw.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe"C:\Users\Admin\AppData\Local\Temp\6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oo8Nr58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oo8Nr58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yl4TJ91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yl4TJ91.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1bC97nU3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1bC97nU3.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2FU6609.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2FU6609.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 5965⤵
- Program crash
PID:3848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Ps69La.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Ps69La.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 6124⤵
- Program crash
PID:540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4yC662Hw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4yC662Hw.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 1563⤵
- Program crash
PID:692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2500 -ip 25001⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3508 -ip 35081⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2688 -ip 26881⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD5a38ce3e2dc246d8e40f95186737c588f
SHA187eb3f865fdd506f345d1d586f4d8c4d490f669a
SHA256c42efcd5f53c75f36a6ed5c8f8be82359b848285ffb0fc5acc12fbd625c7028e
SHA5129b6dec7f0eaae988f522ec927e0082dd03ead7605387c52d6184ee899154c85e9f180622b7ca32377a9e9a0b1972e24131e0a47e2b27797c55736b25261d27c9
-
Filesize
696KB
MD5bc157c64b1b6abbfd383165d6400ed08
SHA1927f749974432f95ca3dc8917c1bf42d2e421665
SHA25695c0c498aee014e9ce0fcbb4882d54d97b0dd80e257f09f19467e7137d6d6e88
SHA512730af361f1dc2f9c027200376b872dd36242a6ab47c59f52a8374c65efb68b37963d109cfb07b0cf49849e251d85a0f61c72244344517fa273fdae9e2e98dc55
-
Filesize
268KB
MD5f09b788bfb242f8edcb4b4ab2bd0275a
SHA171b2273479460cbda9d08073d0b116935d2c6813
SHA256f291d8694f3198b824474d57a18792218a5d622f2f59370efe6679563db87521
SHA512709bdc1a303159b27f7e7fa793d1c78f3d6223b5a3ba2c03cbea36eafc1bd0e2edc1bd19e61f7ed5ca53a1ab5018d7c171fc9c3c4ff67b02b4087a07cfd5dda6
-
Filesize
452KB
MD5926a1d98af5f587a0c943222fffd5d0d
SHA1e399f38a5a536d4dd049ae1d8b1a44152c24881c
SHA2565ebcef1ca0954bb66e095bba171335808084c6a847d5bf152f055d2e3b9c76e1
SHA512f5bf07ba36acf490669ca5ed76a293ce61b6d8f22dc70c39e6c69fe33d33e610f82d14a2e0a3d83b9152a72d8272dd71dd48e2afeafda4935d81f67ef37193a3
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3