Overview
overview
10Static
static
3196993766d...e4.exe
windows10-2004-x64
102cb02eeff0...07.exe
windows10-2004-x64
10515ca9dbb0...70.exe
windows10-2004-x64
10637e68df5f...fc.exe
windows10-2004-x64
1067adfef018...3f.exe
windows10-2004-x64
10753ea0d141...ee.exe
windows10-2004-x64
1075a099d51b...a2.exe
windows10-2004-x64
107bc60a53f2...61.exe
windows10-2004-x64
10878c11674c...59.exe
windows10-2004-x64
10905a82b666...03.exe
windows10-2004-x64
109e0acffebc...ef.exe
windows10-2004-x64
109e61b06119...c5.exe
windows10-2004-x64
10a8e7ed480b...c2.exe
windows10-2004-x64
10b55e0e5824...a8.exe
windows10-2004-x64
10b6f3ae7c80...fd.exe
windows10-2004-x64
10c3d6d3e893...ba.exe
windows10-2004-x64
10d68f556e86...13.exe
windows10-2004-x64
10f67e1f80fb...aa.exe
windows10-2004-x64
10fb8a184cad...cb.exe
windows10-2004-x64
10fe5b99ae2f...bb.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
196993766d9fd8e527e04ab6a57e61f104a8d6b651d9eff81ea121f7261d88e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2cb02eeff015b5724c548dcd8876db39d785c6beedf358fa6fa4dc6934541b07.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
67adfef0180eabce1681648e2c46c32d12d6f42f83d1e0f23337cb248ea7503f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
753ea0d14181cbd10e784c6def975e1b2a0adae8cdb71930dececfc455cd59ee.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
75a099d51b4f58a6df537c770b8d75820445fa7798e533b8d2312b46e4d407a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
878c11674c0d8a2d45512540cc40d386c9d9226a6518be88109168224c8be159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9e61b06119f566b9fb98b46bbce9cb6e128f7a58de8e4266a2867a96d521f2c5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a8e7ed480b5dfd7831f86d676442a11db9686f0cd83ee01f32b92a8a254080c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b6f3ae7c8039baa6291649906002be6daa14265e311c369866980f296919acfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c3d6d3e893fd99f013083ef64a70f3ab8cfdb8848fd2fccbb6d2844033a3f4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d68f556e867c0edd6db1857c4fa9aa2c6410b74fde30d6438fe50ffcf382e413.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f67e1f80fbd3845a74490559e6a9ca3526fb093df5cd3852b6de4cd319d401aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe
Resource
win10v2004-20240226-en
General
-
Target
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe
-
Size
1.2MB
-
MD5
9e0a65a6354df7e961d797ff850db432
-
SHA1
6760ff14c6890d975c5ffb5a2cb8b6f3300ed115
-
SHA256
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb
-
SHA512
b90ae16f118333db8081b8921138425a6dfd29785c1b9ae884f590a12281d99a255b0ec3abb275ae9ec27468a07ab7393762b4edd6e32f5dcb9e608bf1f4eafb
-
SSDEEP
24576:fyMGHOJwixm0Y3ELv66HZJxHzSd6T05Efj4Rx891fFOn2bt6Anu:qjHuZY3EWEZfSd00u4qNOnYtNn
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral19/memory/2404-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral19/memory/2404-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral19/memory/2404-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023568-40.dat family_redline behavioral19/memory/3200-42-0x00000000007C0000-0x00000000007FE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3236 Gl2cZ1op.exe 2832 Jd3tw7ja.exe 4160 WM7te5go.exe 4508 LK3En3pn.exe 5064 1Jm90GG6.exe 3200 2Mr852Yb.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" WM7te5go.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" LK3En3pn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Gl2cZ1op.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Jd3tw7ja.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5064 set thread context of 2404 5064 1Jm90GG6.exe 98 -
Program crash 1 IoCs
pid pid_target Process procid_target 4432 5064 WerFault.exe 94 -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 224 wrote to memory of 3236 224 fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe 90 PID 224 wrote to memory of 3236 224 fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe 90 PID 224 wrote to memory of 3236 224 fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe 90 PID 3236 wrote to memory of 2832 3236 Gl2cZ1op.exe 91 PID 3236 wrote to memory of 2832 3236 Gl2cZ1op.exe 91 PID 3236 wrote to memory of 2832 3236 Gl2cZ1op.exe 91 PID 2832 wrote to memory of 4160 2832 Jd3tw7ja.exe 92 PID 2832 wrote to memory of 4160 2832 Jd3tw7ja.exe 92 PID 2832 wrote to memory of 4160 2832 Jd3tw7ja.exe 92 PID 4160 wrote to memory of 4508 4160 WM7te5go.exe 93 PID 4160 wrote to memory of 4508 4160 WM7te5go.exe 93 PID 4160 wrote to memory of 4508 4160 WM7te5go.exe 93 PID 4508 wrote to memory of 5064 4508 LK3En3pn.exe 94 PID 4508 wrote to memory of 5064 4508 LK3En3pn.exe 94 PID 4508 wrote to memory of 5064 4508 LK3En3pn.exe 94 PID 5064 wrote to memory of 3756 5064 1Jm90GG6.exe 97 PID 5064 wrote to memory of 3756 5064 1Jm90GG6.exe 97 PID 5064 wrote to memory of 3756 5064 1Jm90GG6.exe 97 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 5064 wrote to memory of 2404 5064 1Jm90GG6.exe 98 PID 4508 wrote to memory of 3200 4508 LK3En3pn.exe 104 PID 4508 wrote to memory of 3200 4508 LK3En3pn.exe 104 PID 4508 wrote to memory of 3200 4508 LK3En3pn.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe"C:\Users\Admin\AppData\Local\Temp\fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gl2cZ1op.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gl2cZ1op.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Jd3tw7ja.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Jd3tw7ja.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WM7te5go.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WM7te5go.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LK3En3pn.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LK3En3pn.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm90GG6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm90GG6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 5967⤵
- Program crash
PID:4432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mr852Yb.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mr852Yb.exe6⤵
- Executes dropped EXE
PID:3200
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5064 -ip 50641⤵PID:3736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3628,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=3888 /prefetch:81⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5207e39b69d7fcde973111a1f3584b5cc
SHA1f65911bdbc34f2310aadc194def9528bb64f75d0
SHA25654b1927c8b0cd0b9a35cb91a8b444127c67d5767343e0cadbc071d60b2a873c2
SHA51221528a60fa39450a9207764d41cc75c34806a8ef66971a64af6b575e5f4589d574711deaa0960128a9a51183d4a6142057f721aadc5a82f002c021b21595bc1d
-
Filesize
884KB
MD50a5863d64e23c4f3ef3200779c1ebff4
SHA1e9bf567f5570e75e76b85b055cb1345a74f27ce8
SHA256cd9360589c2015aee54ccf40f997c832bf2930ab69211f5d8a4698a5886e3d63
SHA512ad4a65779b8a1991589f078b8b5016be7535b00762217612fcc5ae82864d8852f400d393b275841b336d09b29aaae501959651c4efabeba50ea1d454adb115d1
-
Filesize
590KB
MD5943b112749ec2b1d79d6d9dfbfbc61f6
SHA154345a752550c0fb4b7a9f7d604d6ca6e21ec8fb
SHA2569e866e22f3b5578b8badbfdcbcb9ee9d3052a5bf1c87c22569e90ba464f3c3fa
SHA512c8f30d5d0da0ff2b8abf6777fc541038e9fb9923e0b365aa0c21ab84c21593c7ba49edc640af0a3c1ae70160911be3d7a9dee4e9df0a57d97b2e41b0c4b08a7a
-
Filesize
417KB
MD5f222096f65e28b52fc018ad530a51db3
SHA10c10946b0657300cf01c7103e0f9bc3313d727e4
SHA256ba63b2fb09ce0756ebbb4f972c35c0cea4079ab86292ac3651960fe46c0173f1
SHA512047b915ec2ad4fbb6e41a51bd0b9c8672d72d74c3e97851b87150a27891671225303bb0efb660db91653f4256bedf1fbd847fda6cde94391b8e42119750dfb94
-
Filesize
378KB
MD5057684fdcfa64b387fd4c84e88123632
SHA12ec62abf9fe6673ef75748a0d89e201907608297
SHA25691cd87b4da0609ef7b600b7d349deffdae7fcd863ddaf4bb5da0c5dfae1fc986
SHA512bfccf7d1ee9f070c4b12ecb1062e4ba48b40a738d30b6bf0ee0bfb183021903ee775568ba3015d8be1af0686c16e2ebf610410c2061ec105a2bdf3221f0404b1
-
Filesize
231KB
MD50e26b34a4953bad439184ed9df9144aa
SHA1470b2e126601928eaf3a1f9aafe4f59884ea07ab
SHA2569bb4c8ad8de9222070fbd129e7d7b24224d5fe58522f16a896e4614eddb940c8
SHA5123d0d3799fff587cb703ea40b121d7d5f3713d521cacb7c42d818349d12d2e9f6f44ffe33e25d8a232acd9a18234d8ea8cbb8eb20174c11c53f4122798e9ad3b0