Overview
overview
10Static
static
3196993766d...e4.exe
windows10-2004-x64
102cb02eeff0...07.exe
windows10-2004-x64
10515ca9dbb0...70.exe
windows10-2004-x64
10637e68df5f...fc.exe
windows10-2004-x64
1067adfef018...3f.exe
windows10-2004-x64
10753ea0d141...ee.exe
windows10-2004-x64
1075a099d51b...a2.exe
windows10-2004-x64
107bc60a53f2...61.exe
windows10-2004-x64
10878c11674c...59.exe
windows10-2004-x64
10905a82b666...03.exe
windows10-2004-x64
109e0acffebc...ef.exe
windows10-2004-x64
109e61b06119...c5.exe
windows10-2004-x64
10a8e7ed480b...c2.exe
windows10-2004-x64
10b55e0e5824...a8.exe
windows10-2004-x64
10b6f3ae7c80...fd.exe
windows10-2004-x64
10c3d6d3e893...ba.exe
windows10-2004-x64
10d68f556e86...13.exe
windows10-2004-x64
10f67e1f80fb...aa.exe
windows10-2004-x64
10fb8a184cad...cb.exe
windows10-2004-x64
10fe5b99ae2f...bb.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
196993766d9fd8e527e04ab6a57e61f104a8d6b651d9eff81ea121f7261d88e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2cb02eeff015b5724c548dcd8876db39d785c6beedf358fa6fa4dc6934541b07.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
67adfef0180eabce1681648e2c46c32d12d6f42f83d1e0f23337cb248ea7503f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
753ea0d14181cbd10e784c6def975e1b2a0adae8cdb71930dececfc455cd59ee.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
75a099d51b4f58a6df537c770b8d75820445fa7798e533b8d2312b46e4d407a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
878c11674c0d8a2d45512540cc40d386c9d9226a6518be88109168224c8be159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9e61b06119f566b9fb98b46bbce9cb6e128f7a58de8e4266a2867a96d521f2c5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a8e7ed480b5dfd7831f86d676442a11db9686f0cd83ee01f32b92a8a254080c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b6f3ae7c8039baa6291649906002be6daa14265e311c369866980f296919acfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c3d6d3e893fd99f013083ef64a70f3ab8cfdb8848fd2fccbb6d2844033a3f4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d68f556e867c0edd6db1857c4fa9aa2c6410b74fde30d6438fe50ffcf382e413.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f67e1f80fbd3845a74490559e6a9ca3526fb093df5cd3852b6de4cd319d401aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe
Resource
win10v2004-20240226-en
General
-
Target
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe
-
Size
1.6MB
-
MD5
910d8cb1b127b0f7bea2eb47a939c260
-
SHA1
1143362d66c21434412eea597e464e4f154dd205
-
SHA256
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8
-
SHA512
77719c68bc8889bbc029a37278de643b531dfb207cee720a8d3f926fd209f5397a09f477c7f9e4995ce4b54315b321530adcd227bfc729b41222ce7e483f5d2e
-
SSDEEP
24576:ZyFiu4btkJLleIxFYm5MYiGw6u+nFP+D1uLiUOht2MIlD0gNtLct1FqEa9MfR3nj:Mk7Qv5MYNn5mULiUqJ2DMtRR/VP
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral14/memory/3572-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral14/memory/3572-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral14/memory/3572-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral14/files/0x0007000000023431-40.dat family_redline behavioral14/memory/3688-42-0x0000000000A20000-0x0000000000A5E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3376 Nk8Wz5bs.exe 3260 Pr5Vj2Vi.exe 4788 Vf9Ik3Xb.exe 2300 Jf7Db6CK.exe 2388 1Nf14qm3.exe 3688 2xs091la.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Pr5Vj2Vi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Vf9Ik3Xb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Jf7Db6CK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Nk8Wz5bs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2388 set thread context of 3572 2388 1Nf14qm3.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 5028 2388 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3516 wrote to memory of 3376 3516 b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe 82 PID 3516 wrote to memory of 3376 3516 b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe 82 PID 3516 wrote to memory of 3376 3516 b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe 82 PID 3376 wrote to memory of 3260 3376 Nk8Wz5bs.exe 83 PID 3376 wrote to memory of 3260 3376 Nk8Wz5bs.exe 83 PID 3376 wrote to memory of 3260 3376 Nk8Wz5bs.exe 83 PID 3260 wrote to memory of 4788 3260 Pr5Vj2Vi.exe 84 PID 3260 wrote to memory of 4788 3260 Pr5Vj2Vi.exe 84 PID 3260 wrote to memory of 4788 3260 Pr5Vj2Vi.exe 84 PID 4788 wrote to memory of 2300 4788 Vf9Ik3Xb.exe 85 PID 4788 wrote to memory of 2300 4788 Vf9Ik3Xb.exe 85 PID 4788 wrote to memory of 2300 4788 Vf9Ik3Xb.exe 85 PID 2300 wrote to memory of 2388 2300 Jf7Db6CK.exe 86 PID 2300 wrote to memory of 2388 2300 Jf7Db6CK.exe 86 PID 2300 wrote to memory of 2388 2300 Jf7Db6CK.exe 86 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2388 wrote to memory of 3572 2388 1Nf14qm3.exe 89 PID 2300 wrote to memory of 3688 2300 Jf7Db6CK.exe 94 PID 2300 wrote to memory of 3688 2300 Jf7Db6CK.exe 94 PID 2300 wrote to memory of 3688 2300 Jf7Db6CK.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe"C:\Users\Admin\AppData\Local\Temp\b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nk8Wz5bs.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nk8Wz5bs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pr5Vj2Vi.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pr5Vj2Vi.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vf9Ik3Xb.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vf9Ik3Xb.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Jf7Db6CK.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Jf7Db6CK.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Nf14qm3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Nf14qm3.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 5767⤵
- Program crash
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xs091la.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xs091la.exe6⤵
- Executes dropped EXE
PID:3688
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2388 -ip 23881⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD586f912ca3d23cb0a783616e35b25750d
SHA1f1b2298c2f621870001c5ad4424ac6dec3e0bf34
SHA2566d5a1b05c5e809e423b89f3d44938e2ed28df8e1921c504afae37af9caf79316
SHA512ff26648b1e4fa0718a6f5d1f9fe10e826975553303c442df25acd5465080dbf56be1f391e2c467adcef77157780af1ae480b2d76ee145cc56187fa23000848c4
-
Filesize
1.3MB
MD52a9e76160e2a6d7f3f671d10590344a0
SHA1bd2a26ee6c35e5b2bcf1887e3b39d7e54cd53018
SHA256b6af805c21fbac36ac8290d0b39d413d2c63ff6967309c40d6b5ffbf3f01bf84
SHA5128f15a39b0a54a9caa076a401be756fae1f097e1f9b69b6942148353ec26aabf99296da033febd43401cb003d4c63c3f67842d18d34d50a92507c2ab4d80a7cd8
-
Filesize
822KB
MD5501fa5ab8377753a53b5a0bf98bfee90
SHA1083acf68071e1d9729ca4fcce7cfa09626c93d6d
SHA256fd087bd2caa1cb2da82bdc49ad7427bbc8788f1f65e6486617e8b4b6616c71c5
SHA512bb526a4aba86464a4c28f03c75d75ecc07acda51ff58617cac3a589523737b3d6649c682243a06e733aef733a089175f15d8b4451375945d0e1e5402767c4449
-
Filesize
649KB
MD57cde77224cc459741908419cf6f98263
SHA1441924a8959647b99040fc71319a963fb21b1aa7
SHA25638215027a5246194bf65451f6ec6ed223342852faed225012ddace1e74d43bc9
SHA512bbc46792b05472475771b3cae9169912d673164fec38ec325e01029772adc37281aefacafcc69a1553771b86c1877949566a7e66704e6df97a805010c0609b3e
-
Filesize
1.7MB
MD5f1d8d26a9c6cd846f6265eb4d63d5212
SHA1b599780b649cdc0cb2954b6d368767cd1747ab37
SHA256ee18e70e03d08a5c5b70f5950c8f903712ced0a1d516edea7ff3c2885f0150b9
SHA5126d94c2de4142df2d45931a7e29d9ee28f529cfebceda0d7f4ffecedd24a4c93488e30c03e5305823578207485cbbbd8f7fecfc6e7106cb1651d4217f4cf02716
-
Filesize
230KB
MD5ebaf50cbfdf25d7eb28b06a84883d7d6
SHA15940c6a6e60a020dfad184900a0b726b3f897dc2
SHA2562f425af02a1ea4c6caadd633388869c53f10ba0aaa67f6e39f23640dfcc901b2
SHA512796ac84bdd410754c8364ff674cc7f278697024cdb4c906673153afe035424859c295973d20918589d7b47a1d50bdcc6b5430167cb97e1bb2d9b6c86d038a700