Overview
overview
10Static
static
30a7a53ccfc...4d.exe
windows10-2004-x64
1015fd14ba21...b7.exe
windows10-2004-x64
101ded3ef8a6...eb.exe
windows10-2004-x64
10211c4e6a11...13.exe
windows10-2004-x64
102143b79ffb...90.exe
windows10-2004-x64
10262bcbb295...79.exe
windows10-2004-x64
102db3eb661b...10.exe
windows10-2004-x64
1038f672e7cb...04.exe
windows10-2004-x64
103a8f22ea92...1f.exe
windows10-2004-x64
104ad2507250...50.exe
windows10-2004-x64
104d264f872f...4d.exe
windows10-2004-x64
105dcad04e9c...98.exe
windows10-2004-x64
10838e53197e...9e.exe
windows10-2004-x64
109fb3613b82...eb.exe
windows10-2004-x64
10ada5308889...6d.exe
windows10-2004-x64
10b7edb218fe...67.exe
windows10-2004-x64
10c7a8b128f1...e0.exe
windows7-x64
10c7a8b128f1...e0.exe
windows10-2004-x64
10d0c2f16d85...04.exe
windows10-2004-x64
10d686e13696...c7.exe
windows10-2004-x64
10f2cce909ec...10.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
0a7a53ccfce8285cb27448942f3d9d7ebbb0f13842117794de0c0f0400ce0e4d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
15fd14ba215a3a52dd8119cc0a0383f0cac34dab2c608f1481d6dac8a34084b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1ded3ef8a66199255bccbc48246fb511b05dd362acee6fc379d36afee68aa1eb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
211c4e6a11f15bd767da6f104c223571e677d598cba947fc6ecc736fb041af13.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2143b79ffb1f51097ecfe2735d76fc401ff83d0bcaf0fd826616f6d9d198fb90.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2db3eb661bd1960f4f027053512a24f0c61f26c7314d49ff0114cec48de8d110.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
38f672e7cba986b4d9af3c51220a9df7a2a858c8744e2594475ff11d2cd80504.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
3a8f22ea9247ba12276740888c7a9a8788ce979e8b28264aa64fb310a6e2d31f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
4ad2507250fbdef342d1a5b86c7770a3cffa183db840e5cfa7a9d117b2dc0a50.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
4d264f872fb903372cc6951f97478ade2ed4cea3c43c1ac9c7b62d645b0d804d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
5dcad04e9c2aa52649ef1e07b38e5668f57adeaa2edee41a8ec26857ee232498.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
838e53197e2b7417e755d1062885d43a64760f6d02f778afd7cca835a5a99d9e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9fb3613b8287cadb1f1a45c550f5b98f012dcc95bb947f3b8b3d68303b6bc3eb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
ada5308889c1e0686823a15717a0ebb9de3bbf2d5e47447e5a340ce70ef33f6d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b7edb218fec9ad9d3c425768ecc3c868db6dcd17f414b4c8a5337d3b4c908867.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c7a8b128f176ee758430b94fea1f5e6ac1085905600d0d4bd333a5ff1414fae0.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
c7a8b128f176ee758430b94fea1f5e6ac1085905600d0d4bd333a5ff1414fae0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
d0c2f16d854f2a43aa1e6953688db2ca945fdc7bb7578431f3ff430ebfa6dc04.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
d686e13696bd68f852ead6d9f363bc3da451cda82485f639727be0ee38b8dac7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe
Resource
win10v2004-20240508-en
General
-
Target
f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe
-
Size
271KB
-
MD5
14785244df56dafbcba731e754f337b7
-
SHA1
fa1b26096b380b30ffb942684daa38d27c32121c
-
SHA256
f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10
-
SHA512
37d93d6d187e2566b2a1554351642405020a3d6c8687fd0c7f93ba7dedf0a88c0164aa27cc330fb746f77faed0684133c5b39ab971404748c9172bd9d68cdffd
-
SSDEEP
6144:Kiy+bnr+kp0yN90QE1d3Y9nv/kYJknL1PxMba4:aMroy90vdo9nvQZE
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral21/files/0x00090000000233c9-5.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral21/files/0x00070000000233e1-8.dat family_redline behavioral21/memory/548-11-0x00000000000A0000-0x00000000000D0000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 3124 m5866127.exe 548 n7650476.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3124 4820 f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe 82 PID 4820 wrote to memory of 3124 4820 f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe 82 PID 4820 wrote to memory of 3124 4820 f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe 82 PID 4820 wrote to memory of 548 4820 f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe 83 PID 4820 wrote to memory of 548 4820 f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe 83 PID 4820 wrote to memory of 548 4820 f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe"C:\Users\Admin\AppData\Local\Temp\f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5866127.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5866127.exe2⤵
- Executes dropped EXE
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7650476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7650476.exe2⤵
- Executes dropped EXE
PID:548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD58451f8d13ffcce226ae36033c3e6ad2b
SHA11b31c7441ea79f6ccd04aebdcbbb6835e4c5a951
SHA256cdb414688bffff299a1b6b13fbfdb4623791ac4d4995c721b8051240bf88700b
SHA5125d3eb6f8e8ad3dfe697a112827dc9b9a8bbe7dbc51d3d896d8417befa00ca0332badaa7a3d298d02025d2c0ced7e5dba30139814b7daedb66be1eae1a317355f
-
Filesize
175KB
MD556b71bdd64b7dcb7d4f73f78df3e7587
SHA1f0cf562a4f7e7f67c68e3605ffb40ed9e91c8799
SHA25631a466c0c05f4feced392f0ffd93d372c9bd322f6bfb3ee81469c43472458ba0
SHA51249ec197872531ccbfd0d67766dfdc51713a45ca3a119b10e84dea745a4ac0334094ed1ed6bf4a76f88ed73be2606ee3db014987a7c82d5dd38f4d2e7c86f2d26