Overview
overview
10Static
static
3196993766d...e4.exe
windows10-2004-x64
102cb02eeff0...07.exe
windows10-2004-x64
10515ca9dbb0...70.exe
windows10-2004-x64
10637e68df5f...fc.exe
windows10-2004-x64
1067adfef018...3f.exe
windows10-2004-x64
10753ea0d141...ee.exe
windows10-2004-x64
1075a099d51b...a2.exe
windows10-2004-x64
107bc60a53f2...61.exe
windows10-2004-x64
10878c11674c...59.exe
windows10-2004-x64
10905a82b666...03.exe
windows10-2004-x64
109e0acffebc...ef.exe
windows10-2004-x64
109e61b06119...c5.exe
windows10-2004-x64
10a8e7ed480b...c2.exe
windows10-2004-x64
10b55e0e5824...a8.exe
windows10-2004-x64
10b6f3ae7c80...fd.exe
windows10-2004-x64
10c3d6d3e893...ba.exe
windows10-2004-x64
10d68f556e86...13.exe
windows10-2004-x64
10f67e1f80fb...aa.exe
windows10-2004-x64
10fb8a184cad...cb.exe
windows10-2004-x64
10fe5b99ae2f...bb.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
196993766d9fd8e527e04ab6a57e61f104a8d6b651d9eff81ea121f7261d88e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2cb02eeff015b5724c548dcd8876db39d785c6beedf358fa6fa4dc6934541b07.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
67adfef0180eabce1681648e2c46c32d12d6f42f83d1e0f23337cb248ea7503f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
753ea0d14181cbd10e784c6def975e1b2a0adae8cdb71930dececfc455cd59ee.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
75a099d51b4f58a6df537c770b8d75820445fa7798e533b8d2312b46e4d407a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
878c11674c0d8a2d45512540cc40d386c9d9226a6518be88109168224c8be159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9e61b06119f566b9fb98b46bbce9cb6e128f7a58de8e4266a2867a96d521f2c5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a8e7ed480b5dfd7831f86d676442a11db9686f0cd83ee01f32b92a8a254080c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b6f3ae7c8039baa6291649906002be6daa14265e311c369866980f296919acfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c3d6d3e893fd99f013083ef64a70f3ab8cfdb8848fd2fccbb6d2844033a3f4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d68f556e867c0edd6db1857c4fa9aa2c6410b74fde30d6438fe50ffcf382e413.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f67e1f80fbd3845a74490559e6a9ca3526fb093df5cd3852b6de4cd319d401aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe
Resource
win10v2004-20240226-en
General
-
Target
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
-
Size
1.2MB
-
MD5
8062d3af8d126f153a6f8d5203972b4b
-
SHA1
fcaf218814d45ed77751ff21057ad3bca5c6f485
-
SHA256
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef
-
SHA512
b5ee77a25aee48c11c645996f7b7faecdf168e979b5d76afd1093ae28deaa35a01c7db398155f13da6ae757cf05c536688a081ca8e07c332fb7c646b8a8a2f33
-
SSDEEP
24576:zytYpZ9ztKtIUClvanandVVGNLCgLnKPgLbdj6u5eBrEsaDrR:GepHxVkoTVqLC0KPMdj6wcrEHr
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral11/memory/684-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral11/memory/684-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral11/memory/684-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral11/files/0x0007000000023436-41.dat family_redline behavioral11/memory/4772-42-0x0000000000D60000-0x0000000000D9E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4196 gZ5mf7eF.exe 896 SM1pu0Yq.exe 1620 Qi0cc5MQ.exe 3380 sk3Kb5ZK.exe 4252 1Fv43JS4.exe 4772 2BI504Uu.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" SM1pu0Yq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Qi0cc5MQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" sk3Kb5ZK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gZ5mf7eF.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4252 set thread context of 684 4252 1Fv43JS4.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 2932 4252 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1908 wrote to memory of 4196 1908 9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe 82 PID 1908 wrote to memory of 4196 1908 9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe 82 PID 1908 wrote to memory of 4196 1908 9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe 82 PID 4196 wrote to memory of 896 4196 gZ5mf7eF.exe 83 PID 4196 wrote to memory of 896 4196 gZ5mf7eF.exe 83 PID 4196 wrote to memory of 896 4196 gZ5mf7eF.exe 83 PID 896 wrote to memory of 1620 896 SM1pu0Yq.exe 84 PID 896 wrote to memory of 1620 896 SM1pu0Yq.exe 84 PID 896 wrote to memory of 1620 896 SM1pu0Yq.exe 84 PID 1620 wrote to memory of 3380 1620 Qi0cc5MQ.exe 85 PID 1620 wrote to memory of 3380 1620 Qi0cc5MQ.exe 85 PID 1620 wrote to memory of 3380 1620 Qi0cc5MQ.exe 85 PID 3380 wrote to memory of 4252 3380 sk3Kb5ZK.exe 86 PID 3380 wrote to memory of 4252 3380 sk3Kb5ZK.exe 86 PID 3380 wrote to memory of 4252 3380 sk3Kb5ZK.exe 86 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 4252 wrote to memory of 684 4252 1Fv43JS4.exe 90 PID 3380 wrote to memory of 4772 3380 sk3Kb5ZK.exe 95 PID 3380 wrote to memory of 4772 3380 sk3Kb5ZK.exe 95 PID 3380 wrote to memory of 4772 3380 sk3Kb5ZK.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe"C:\Users\Admin\AppData\Local\Temp\9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gZ5mf7eF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gZ5mf7eF.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SM1pu0Yq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SM1pu0Yq.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qi0cc5MQ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qi0cc5MQ.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sk3Kb5ZK.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sk3Kb5ZK.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Fv43JS4.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Fv43JS4.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 5927⤵
- Program crash
PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2BI504Uu.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2BI504Uu.exe6⤵
- Executes dropped EXE
PID:4772
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4252 -ip 42521⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD54c49bf93f07480e68ed8ff8509c43222
SHA10632f77b3ccae03933ca21de05e149d723d48166
SHA256fe74c6f85a9822ee1c7b1c91e79b8d3ad0bd88c90955b964d76630b933f7fb8b
SHA512904b2dc28a94a2e0bd04a72f404deb3f60f4c7a7414efc2cdf32e51a1d777d2f2dc092256bd6d5dab15b4dd4f27399ea19a01bb148efead952de001b0e7dc3de
-
Filesize
880KB
MD57fca8b3b5d33b4d31c29c1a9d26a5176
SHA145b2321d9e3c56e77d43dd456496309a3bc3c05e
SHA256a365181ca8531d61be1fa2bb03cac3b188163af7158c16ba0109a1797c49876f
SHA512522b5fdadade19e122c4bf59e356e697b96325d4b4b6f5cd7dbbeea2af31c7aab8136bd8bdc7200d0631511dbddc25b82ad972a1284bbd8f9b07519155697676
-
Filesize
586KB
MD5cb6e3ef3e906497256198eff1a56d498
SHA133c993f5e000652625dde310080dd7e3fb84fa74
SHA25694d62d90e6479e6590e0722e00e56b556765cca0e50d09d481cd57322fc651a2
SHA51246341532c8d8fe14261134dd762b1a20f517773bcf223cc3377d6dfb8614afae4218aaaa9551e84a5332342913eeac6446ce869b65db94ea79ed7294910ba591
-
Filesize
413KB
MD5c3b2b4f5974c0368fda4d2ae4e1f3fe7
SHA13ca52b006dc7520f7d9800cf024052605ee130d5
SHA256efe2791b6dd56d5c1a2521af5c9e46dd3b15a6edf34354c1a06595cba38276c8
SHA512ede9c83c3f602350e42167c03a7ba70465508b78216c59d7da5de6ea694b81007608e452e78ef9575f38fff6e87254861b4ff19fdd96e1f09b48d51f4a6ff24b
-
Filesize
378KB
MD5eae66dcfa5b4edf2ee8f8bcd682c0082
SHA1c75aebb9c1347c416c1fd4d4fcf880bb6ce5fb0c
SHA256c1c47708d2b038156a34ca16e692173ac4b6132f13102e27f78220cbb7b1fa92
SHA51269492135b5dd5d48b22e87276b1d1a339407d3b544cc8e4d14f816bc44dc5e50f99cdb1bcafd9b47ff1d59f376232593482e0969c0ada4cd84d6874702d87ac5
-
Filesize
221KB
MD5f731b3eb6f2bdd8ed02cc299f17afb06
SHA14e95692fc874fe82ce06288c3131a59aa00abdab
SHA2562f5f6a0c5d02edc613f0b284b0faa22fc94486f2f4350b131957bc88a1c86e03
SHA512e98fb9c67198bee75000dc19fec2f93a468dc08248071e83d64595c6c7f2e2c511ff8f2ab4edb814e56bd396098598b610e5de9ff13010d0d8582ac7c84be793