Overview
overview
10Static
static
30a7a53ccfc...4d.exe
windows10-2004-x64
1015fd14ba21...b7.exe
windows10-2004-x64
101ded3ef8a6...eb.exe
windows10-2004-x64
10211c4e6a11...13.exe
windows10-2004-x64
102143b79ffb...90.exe
windows10-2004-x64
10262bcbb295...79.exe
windows10-2004-x64
102db3eb661b...10.exe
windows10-2004-x64
1038f672e7cb...04.exe
windows10-2004-x64
103a8f22ea92...1f.exe
windows10-2004-x64
104ad2507250...50.exe
windows10-2004-x64
104d264f872f...4d.exe
windows10-2004-x64
105dcad04e9c...98.exe
windows10-2004-x64
10838e53197e...9e.exe
windows10-2004-x64
109fb3613b82...eb.exe
windows10-2004-x64
10ada5308889...6d.exe
windows10-2004-x64
10b7edb218fe...67.exe
windows10-2004-x64
10c7a8b128f1...e0.exe
windows7-x64
10c7a8b128f1...e0.exe
windows10-2004-x64
10d0c2f16d85...04.exe
windows10-2004-x64
10d686e13696...c7.exe
windows10-2004-x64
10f2cce909ec...10.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
0a7a53ccfce8285cb27448942f3d9d7ebbb0f13842117794de0c0f0400ce0e4d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
15fd14ba215a3a52dd8119cc0a0383f0cac34dab2c608f1481d6dac8a34084b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1ded3ef8a66199255bccbc48246fb511b05dd362acee6fc379d36afee68aa1eb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
211c4e6a11f15bd767da6f104c223571e677d598cba947fc6ecc736fb041af13.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2143b79ffb1f51097ecfe2735d76fc401ff83d0bcaf0fd826616f6d9d198fb90.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2db3eb661bd1960f4f027053512a24f0c61f26c7314d49ff0114cec48de8d110.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
38f672e7cba986b4d9af3c51220a9df7a2a858c8744e2594475ff11d2cd80504.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
3a8f22ea9247ba12276740888c7a9a8788ce979e8b28264aa64fb310a6e2d31f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
4ad2507250fbdef342d1a5b86c7770a3cffa183db840e5cfa7a9d117b2dc0a50.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
4d264f872fb903372cc6951f97478ade2ed4cea3c43c1ac9c7b62d645b0d804d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
5dcad04e9c2aa52649ef1e07b38e5668f57adeaa2edee41a8ec26857ee232498.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
838e53197e2b7417e755d1062885d43a64760f6d02f778afd7cca835a5a99d9e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9fb3613b8287cadb1f1a45c550f5b98f012dcc95bb947f3b8b3d68303b6bc3eb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
ada5308889c1e0686823a15717a0ebb9de3bbf2d5e47447e5a340ce70ef33f6d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b7edb218fec9ad9d3c425768ecc3c868db6dcd17f414b4c8a5337d3b4c908867.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c7a8b128f176ee758430b94fea1f5e6ac1085905600d0d4bd333a5ff1414fae0.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
c7a8b128f176ee758430b94fea1f5e6ac1085905600d0d4bd333a5ff1414fae0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
d0c2f16d854f2a43aa1e6953688db2ca945fdc7bb7578431f3ff430ebfa6dc04.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
d686e13696bd68f852ead6d9f363bc3da451cda82485f639727be0ee38b8dac7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f2cce909eca03fb472266113aeed9ab44c81218fb6b4de31949151b9543a1f10.exe
Resource
win10v2004-20240508-en
General
-
Target
262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe
-
Size
1.0MB
-
MD5
9d4c21e55871a79578ab62468bbce86c
-
SHA1
04324ce234dbeb79f9dc92d6fdafd3aa1e6a38cb
-
SHA256
262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779
-
SHA512
b63e0f6ddbec19cde69a412b532fb31b639da5764cc7af14c9b0e08f98eaec83b58ddfe4a4fd8b9da9ca7ee248201d005356d869518953944c58f4a9ff833d0d
-
SSDEEP
24576:lyg54E9eWBaCmQjQf5t+dbpoDi7bDrptJT4:AcwnC5QGx7HrT
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral6/memory/4524-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral6/memory/4524-29-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral6/memory/4524-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral6/files/0x0007000000023432-33.dat family_redline behavioral6/memory/1420-35-0x00000000000D0000-0x000000000010E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 4248 qX2KR2eo.exe 724 AC8eB3ti.exe 2308 Yi4Fj8Tb.exe 660 1Ry28uz5.exe 1420 2lq454mH.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" qX2KR2eo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" AC8eB3ti.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Yi4Fj8Tb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 660 set thread context of 4524 660 1Ry28uz5.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 1772 660 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 852 wrote to memory of 4248 852 262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe 82 PID 852 wrote to memory of 4248 852 262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe 82 PID 852 wrote to memory of 4248 852 262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe 82 PID 4248 wrote to memory of 724 4248 qX2KR2eo.exe 83 PID 4248 wrote to memory of 724 4248 qX2KR2eo.exe 83 PID 4248 wrote to memory of 724 4248 qX2KR2eo.exe 83 PID 724 wrote to memory of 2308 724 AC8eB3ti.exe 84 PID 724 wrote to memory of 2308 724 AC8eB3ti.exe 84 PID 724 wrote to memory of 2308 724 AC8eB3ti.exe 84 PID 2308 wrote to memory of 660 2308 Yi4Fj8Tb.exe 85 PID 2308 wrote to memory of 660 2308 Yi4Fj8Tb.exe 85 PID 2308 wrote to memory of 660 2308 Yi4Fj8Tb.exe 85 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 660 wrote to memory of 4524 660 1Ry28uz5.exe 89 PID 2308 wrote to memory of 1420 2308 Yi4Fj8Tb.exe 94 PID 2308 wrote to memory of 1420 2308 Yi4Fj8Tb.exe 94 PID 2308 wrote to memory of 1420 2308 Yi4Fj8Tb.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe"C:\Users\Admin\AppData\Local\Temp\262bcbb295c2330c7e75858027b884202657e03c12f0537ccae57764c7e90779.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qX2KR2eo.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qX2KR2eo.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AC8eB3ti.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AC8eB3ti.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Yi4Fj8Tb.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Yi4Fj8Tb.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ry28uz5.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ry28uz5.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 6126⤵
- Program crash
PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lq454mH.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2lq454mH.exe5⤵
- Executes dropped EXE
PID:1420
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 660 -ip 6601⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
878KB
MD573455976fe29dda0ec08147df273a6d8
SHA1de69b87171c7ddffd42477cfd0ff27134286d539
SHA2569e96aa6f94c8e26f1a49b54814a358955ea564bbfeed63db5e28539d14e67f6c
SHA512c089cf59f0990af75a89e05651335f77b77710cd8728349ef04300b5c0e986046ce19664509e516d33d8c33fd31a1a01646a8f08d6d4e45ca7edf0a1a922e637
-
Filesize
584KB
MD58044cdb804a4f851d01ce604d62e53f0
SHA16dd2f01b651cd0086e8283ff008b5d1bafdb667b
SHA2567709634b6cfa55c26ec7abfc547e94d6262d328a34780ac54136900d91fc7a25
SHA5129f55e1d12810c3a22961ecdeda1cd51ac9a4df8f0cd424dcccf68749b676ccdbaab05c0c067980fd549b8d6dc358b1c84784ac4f77f1958a2e8aa5098c3c2634
-
Filesize
412KB
MD5f171476f815f6d30b080ee8515e559c7
SHA19f8738987b291328c7c01333695de1e66cf22ff5
SHA256c673bc0d31248d0909bf0256db28e8691c536fc519f94de2967f059e754b89e0
SHA512795cb4f5cb3220b548cf347785784eb7254292d0dc6c24aaf7bc9e4b9e11aa8e1cf6d55f609a55ef71c51f273474cf2f07d932e60df1d7fe50a34c389fcca4cc
-
Filesize
378KB
MD53487e35dfb3f0b20109093e6e63119f8
SHA12b952cc4cf21a428298405431c3acd7897d0df78
SHA25665f17c7f30c7a6d53ebd95d379a0e28f86aeafb012a671c55658b8b29a93069b
SHA51239f2fc2cee5a0a65e028d537d58e628cd8edc7b0a6f155a077ccaaf07f01eed9dc7be8cdfd691167b1e7930d429893d3b417778e553ba87de9921f364fa1e14b
-
Filesize
221KB
MD5f39a595e1cc7fe2133045e4eb0a14a62
SHA1983d31c0de46d6f3b00df8a38141a6157f3ec4da
SHA2569bbe071b113aaef9b68df1a2340367b091c052ea396b2eed06af5fa98d4a2055
SHA5125a9cab7733a8e7f84378ceda3bbe1f635afb6bbb48f1e760a74b5fed1afd39ef9aa1f37df696dd3a90adc85094bcf1808faa59f375705fda7462195b3cab36f0