Overview
overview
10Static
static
3196993766d...e4.exe
windows10-2004-x64
102cb02eeff0...07.exe
windows10-2004-x64
10515ca9dbb0...70.exe
windows10-2004-x64
10637e68df5f...fc.exe
windows10-2004-x64
1067adfef018...3f.exe
windows10-2004-x64
10753ea0d141...ee.exe
windows10-2004-x64
1075a099d51b...a2.exe
windows10-2004-x64
107bc60a53f2...61.exe
windows10-2004-x64
10878c11674c...59.exe
windows10-2004-x64
10905a82b666...03.exe
windows10-2004-x64
109e0acffebc...ef.exe
windows10-2004-x64
109e61b06119...c5.exe
windows10-2004-x64
10a8e7ed480b...c2.exe
windows10-2004-x64
10b55e0e5824...a8.exe
windows10-2004-x64
10b6f3ae7c80...fd.exe
windows10-2004-x64
10c3d6d3e893...ba.exe
windows10-2004-x64
10d68f556e86...13.exe
windows10-2004-x64
10f67e1f80fb...aa.exe
windows10-2004-x64
10fb8a184cad...cb.exe
windows10-2004-x64
10fe5b99ae2f...bb.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
196993766d9fd8e527e04ab6a57e61f104a8d6b651d9eff81ea121f7261d88e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2cb02eeff015b5724c548dcd8876db39d785c6beedf358fa6fa4dc6934541b07.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
67adfef0180eabce1681648e2c46c32d12d6f42f83d1e0f23337cb248ea7503f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
753ea0d14181cbd10e784c6def975e1b2a0adae8cdb71930dececfc455cd59ee.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
75a099d51b4f58a6df537c770b8d75820445fa7798e533b8d2312b46e4d407a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
878c11674c0d8a2d45512540cc40d386c9d9226a6518be88109168224c8be159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9e61b06119f566b9fb98b46bbce9cb6e128f7a58de8e4266a2867a96d521f2c5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a8e7ed480b5dfd7831f86d676442a11db9686f0cd83ee01f32b92a8a254080c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b6f3ae7c8039baa6291649906002be6daa14265e311c369866980f296919acfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c3d6d3e893fd99f013083ef64a70f3ab8cfdb8848fd2fccbb6d2844033a3f4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d68f556e867c0edd6db1857c4fa9aa2c6410b74fde30d6438fe50ffcf382e413.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f67e1f80fbd3845a74490559e6a9ca3526fb093df5cd3852b6de4cd319d401aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe
Resource
win10v2004-20240226-en
General
-
Target
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe
-
Size
1.2MB
-
MD5
6166d64607711c5c13d3e34594f2c922
-
SHA1
5d2d910948e64bfe6e643a7d28f3d584ecd0f892
-
SHA256
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb
-
SHA512
841e8cb00184591e680a67abd5e68999ea4f14659d61775ad4195586e2f051b039837241562f28985bbcd0ef59e5faf7f17cf1c46421ca43af78616b1e3779c1
-
SSDEEP
24576:tyn6vnWcU7F6V27AD+iul7uBdfm+lQNn2oL4b9/xFh5PQHhCe:IwnsFE27Wk6BdufrL89JZIHs
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral20/memory/2800-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral20/memory/2800-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral20/memory/2800-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral20/files/0x0007000000023276-40.dat family_redline behavioral20/memory/3944-42-0x0000000000390000-0x00000000003CE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4944 bV7tb1zA.exe 2824 qp0HK7Ul.exe 4644 rr4pb6lx.exe 4356 mm6SB2Dy.exe 3432 1Qq98rd6.exe 3944 2oP534VP.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" bV7tb1zA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" qp0HK7Ul.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" rr4pb6lx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" mm6SB2Dy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3432 set thread context of 2800 3432 1Qq98rd6.exe 100 -
Program crash 1 IoCs
pid pid_target Process procid_target 2096 3432 WerFault.exe 96 -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4944 3304 fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe 92 PID 3304 wrote to memory of 4944 3304 fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe 92 PID 3304 wrote to memory of 4944 3304 fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe 92 PID 4944 wrote to memory of 2824 4944 bV7tb1zA.exe 93 PID 4944 wrote to memory of 2824 4944 bV7tb1zA.exe 93 PID 4944 wrote to memory of 2824 4944 bV7tb1zA.exe 93 PID 2824 wrote to memory of 4644 2824 qp0HK7Ul.exe 94 PID 2824 wrote to memory of 4644 2824 qp0HK7Ul.exe 94 PID 2824 wrote to memory of 4644 2824 qp0HK7Ul.exe 94 PID 4644 wrote to memory of 4356 4644 rr4pb6lx.exe 95 PID 4644 wrote to memory of 4356 4644 rr4pb6lx.exe 95 PID 4644 wrote to memory of 4356 4644 rr4pb6lx.exe 95 PID 4356 wrote to memory of 3432 4356 mm6SB2Dy.exe 96 PID 4356 wrote to memory of 3432 4356 mm6SB2Dy.exe 96 PID 4356 wrote to memory of 3432 4356 mm6SB2Dy.exe 96 PID 3432 wrote to memory of 4420 3432 1Qq98rd6.exe 98 PID 3432 wrote to memory of 4420 3432 1Qq98rd6.exe 98 PID 3432 wrote to memory of 4420 3432 1Qq98rd6.exe 98 PID 3432 wrote to memory of 1176 3432 1Qq98rd6.exe 99 PID 3432 wrote to memory of 1176 3432 1Qq98rd6.exe 99 PID 3432 wrote to memory of 1176 3432 1Qq98rd6.exe 99 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 3432 wrote to memory of 2800 3432 1Qq98rd6.exe 100 PID 4356 wrote to memory of 3944 4356 mm6SB2Dy.exe 104 PID 4356 wrote to memory of 3944 4356 mm6SB2Dy.exe 104 PID 4356 wrote to memory of 3944 4356 mm6SB2Dy.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe"C:\Users\Admin\AppData\Local\Temp\fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bV7tb1zA.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bV7tb1zA.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qp0HK7Ul.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qp0HK7Ul.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rr4pb6lx.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rr4pb6lx.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mm6SB2Dy.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mm6SB2Dy.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qq98rd6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qq98rd6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4420
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1176
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 6247⤵
- Program crash
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2oP534VP.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2oP534VP.exe6⤵
- Executes dropped EXE
PID:3944
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3432 -ip 34321⤵PID:2068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5d3da42e88bd2c11504a978f1be9e2fc2
SHA169adf4c22ec9ddf35c8189715d03ffc96d10505b
SHA2563f1fdb06f2d2df9f56632e7bdbaa7e9dc92d1985f527d7dc1618ba2de3256319
SHA512bab5d6a51a1146b936e7219b6fb8c9ed4a367c6b35cc204b8301bed664420030c885d82952ac16ccaf1cc2119d3e3b26cbd677a48bac4a66b6954faf31b34da9
-
Filesize
884KB
MD5ca9c01310163d1c147ca4505207e1c9c
SHA1e8abb26a431267b80f9d621c54bc50c00e4aeb9c
SHA2568529de491a2a0590d4f22d0e79a61a52401bef71a9a9fa63ef21339090de7a5b
SHA512fa0fa5afb4debcfcac92afffb45d35f2c08b5b4c389bd9ff2726263b06b512d7f958c4f255caa7420cb0765097448f9dd9ee9127d1f7149e435e957ef8abee41
-
Filesize
590KB
MD59c238ca3a69f0c5b481a0a037a0cf6ef
SHA19438335c07c5cf19de7c2302e8a6f98c23aa95c6
SHA25699feb47969ccc229401f2c996d99e7b9455030104873bfba2b4ddf1ef6fb3504
SHA512e1c2d51222de3659e92225c79e5ac42e2da41683d87f053f651d7c3a5d1a7526d66bb1815e7e4c59d9f59c59206721d3315b77f0a234aa9d880fea3a9edf2be2
-
Filesize
417KB
MD5a5b1a870dd1633cec15a3b2d218e9ec0
SHA15a31e3cb7c5ffd38d740ef7958a87cd75a84e97d
SHA25665eb5088cac764e5a35252fde315c16772fc54dcad1ff3ecae699f961c55b7f2
SHA5125dc87525a429a2940d43ed8dbc2e30f94b80be577879af5cb2d7a4ec426bf1f7be16dbdb1920d6f8d9acda14eaa07748a1f4433cb12eb042421204a2906ef8ed
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
231KB
MD56eca1aab751425412c29fe1ecf16d232
SHA112ba9fac83ccfd076703c4d7708df5070e7daea6
SHA25625ff023fb901f385e7c2422516ea7f1b0000260601b0109076a1f1957ccc9b4d
SHA512ebb52b1828ac304ecb79d846fd7ecfe3b39b9b5f604cfd8e6f57f53e910353245af9df401c0e85dbd35124c642974d11281277403021adf3e4dcb3a16af8e06a