Overview
overview
10Static
static
3196993766d...e4.exe
windows10-2004-x64
102cb02eeff0...07.exe
windows10-2004-x64
10515ca9dbb0...70.exe
windows10-2004-x64
10637e68df5f...fc.exe
windows10-2004-x64
1067adfef018...3f.exe
windows10-2004-x64
10753ea0d141...ee.exe
windows10-2004-x64
1075a099d51b...a2.exe
windows10-2004-x64
107bc60a53f2...61.exe
windows10-2004-x64
10878c11674c...59.exe
windows10-2004-x64
10905a82b666...03.exe
windows10-2004-x64
109e0acffebc...ef.exe
windows10-2004-x64
109e61b06119...c5.exe
windows10-2004-x64
10a8e7ed480b...c2.exe
windows10-2004-x64
10b55e0e5824...a8.exe
windows10-2004-x64
10b6f3ae7c80...fd.exe
windows10-2004-x64
10c3d6d3e893...ba.exe
windows10-2004-x64
10d68f556e86...13.exe
windows10-2004-x64
10f67e1f80fb...aa.exe
windows10-2004-x64
10fb8a184cad...cb.exe
windows10-2004-x64
10fe5b99ae2f...bb.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
196993766d9fd8e527e04ab6a57e61f104a8d6b651d9eff81ea121f7261d88e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2cb02eeff015b5724c548dcd8876db39d785c6beedf358fa6fa4dc6934541b07.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
67adfef0180eabce1681648e2c46c32d12d6f42f83d1e0f23337cb248ea7503f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
753ea0d14181cbd10e784c6def975e1b2a0adae8cdb71930dececfc455cd59ee.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
75a099d51b4f58a6df537c770b8d75820445fa7798e533b8d2312b46e4d407a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
878c11674c0d8a2d45512540cc40d386c9d9226a6518be88109168224c8be159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9e61b06119f566b9fb98b46bbce9cb6e128f7a58de8e4266a2867a96d521f2c5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a8e7ed480b5dfd7831f86d676442a11db9686f0cd83ee01f32b92a8a254080c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b6f3ae7c8039baa6291649906002be6daa14265e311c369866980f296919acfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c3d6d3e893fd99f013083ef64a70f3ab8cfdb8848fd2fccbb6d2844033a3f4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d68f556e867c0edd6db1857c4fa9aa2c6410b74fde30d6438fe50ffcf382e413.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f67e1f80fbd3845a74490559e6a9ca3526fb093df5cd3852b6de4cd319d401aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe
Resource
win10v2004-20240226-en
General
-
Target
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe
-
Size
1.0MB
-
MD5
bd7ad2e2ad434827a8fd3915ae015b09
-
SHA1
77ac094e9c4cf9e705fc48600903dfb87aa03861
-
SHA256
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470
-
SHA512
0a96a53a9ade93ae9339d03f746dfc76982be6bda99f4e1e7363c319d846c3ae0fd24a599cc03ca21bba7a2f6003d1553d92831b8cc76f878a5fc6b0ddb6e167
-
SSDEEP
24576:iy85RKOIjbKQM9fsA6rYsswJi4KxkdmagQ8Y4EjfJ:J8WB890vF5ukcdxYPj
Malware Config
Extracted
redline
narik
77.91.124.82:19071
-
auth_value
07924f5ef90576eb64faea857b8ba3e5
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral3/files/0x00070000000233e8-68.dat mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection q3999924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q3999924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q3999924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q3999924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q3999924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q3999924.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral3/files/0x00070000000233e5-71.dat family_redline behavioral3/memory/3948-73-0x00000000007F0000-0x0000000000820000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 1572 z8935150.exe 3256 z0859311.exe 4504 z6493950.exe 4992 z6216449.exe 3572 q3999924.exe 4388 r5625798.exe 3948 s8089084.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features q3999924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" q3999924.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8935150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0859311.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z6493950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6216449.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3572 q3999924.exe 3572 q3999924.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3572 q3999924.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1572 1604 515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe 82 PID 1604 wrote to memory of 1572 1604 515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe 82 PID 1604 wrote to memory of 1572 1604 515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe 82 PID 1572 wrote to memory of 3256 1572 z8935150.exe 83 PID 1572 wrote to memory of 3256 1572 z8935150.exe 83 PID 1572 wrote to memory of 3256 1572 z8935150.exe 83 PID 3256 wrote to memory of 4504 3256 z0859311.exe 84 PID 3256 wrote to memory of 4504 3256 z0859311.exe 84 PID 3256 wrote to memory of 4504 3256 z0859311.exe 84 PID 4504 wrote to memory of 4992 4504 z6493950.exe 85 PID 4504 wrote to memory of 4992 4504 z6493950.exe 85 PID 4504 wrote to memory of 4992 4504 z6493950.exe 85 PID 4992 wrote to memory of 3572 4992 z6216449.exe 86 PID 4992 wrote to memory of 3572 4992 z6216449.exe 86 PID 4992 wrote to memory of 3572 4992 z6216449.exe 86 PID 4992 wrote to memory of 4388 4992 z6216449.exe 91 PID 4992 wrote to memory of 4388 4992 z6216449.exe 91 PID 4992 wrote to memory of 4388 4992 z6216449.exe 91 PID 4504 wrote to memory of 3948 4504 z6493950.exe 92 PID 4504 wrote to memory of 3948 4504 z6493950.exe 92 PID 4504 wrote to memory of 3948 4504 z6493950.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe"C:\Users\Admin\AppData\Local\Temp\515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8935150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8935150.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0859311.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0859311.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6493950.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6493950.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6216449.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6216449.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3999924.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3999924.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5625798.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5625798.exe6⤵
- Executes dropped EXE
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8089084.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8089084.exe5⤵
- Executes dropped EXE
PID:3948
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
934KB
MD5e10489890fcc08d6fb09031581d4274d
SHA10d2aff786eea1cb5c2660c218cac76130af24749
SHA256e6f62db3fc63a75a88293f843c6150c94e428505e9869cea17369b3639e54723
SHA512a7f02d4d2aeaffe18ccb099d595bac2808928be4f951005e27b3fce51a42dfaa42979d49259f7a1a0294eb102a782b5f63c866b18ecf33eb132ae78f385a86d6
-
Filesize
708KB
MD58035349678c36a88ada1141dee374443
SHA1dedf9ea4bef2ac8305a2888ecfec088cf70b4df6
SHA25697e83c298bb43aa78fc45ffe37b2b5d5a6a0d3d2a5133fc501587fa046480770
SHA512d1c12e1ebb97a35eaec55bd1e29d1a138d4adbaaa8e60c89dda8820de1e5b0aa0adaed17e4af30083193becfef5df3fbbf25e1ea5fce02ed7fb71c0b75e2caf1
-
Filesize
481KB
MD5af9f480a56127be468e01bebc476fabe
SHA1b3a2899b9e11709dcc9095d72ac1c524a942f790
SHA256ab633be1c170f3c0630f087fec91f9230aabd27c841dfb5f2065cdc35a99dd66
SHA51210a91fe844b8efc3d8d3403ad20b15ba0577193788293a5d0ccd31c9dba4d204b336849939d1f9a935574c912921cfb0b3bce634a8b843d12716e60d5376765a
-
Filesize
174KB
MD506f5490c87d349cdaf895412bcb76241
SHA1a9b586262af627adfaff28891e02d4cfb91121e3
SHA2566d1e456b6e6984e97636cabca99e572185316978847c22ccbdd717aabf405c88
SHA512c8b1eef6406aa61befc303d4379f2ccc7d093c9d45a92a44981e26147134424a80b59e006bae7c9367de18eaf6ae013a7290e957941945ca781bcdff8847b90b
-
Filesize
325KB
MD581e106fdd0a91cb7cf6a401d10c4c78d
SHA1043e74a6f9f23953d8b9e2d0334b561459af87c4
SHA25681747062ec1d74102af8e587b30aa089c3da4f3d9fd9bec3bf2152abc911794a
SHA51274c820774cefa34d5f8c15fe5049b6c6fd37055657b825a0707e6e4879fe1c98a5a0f786400c0ef29d00b517a4ee85fabfe10df24ee29e96844e194847a5deac
-
Filesize
184KB
MD576c19fcba327f4003bc04c91707f6f1a
SHA182c526254045dc699244c1f61283b4fecdb2e2cf
SHA2560f4bf2d15877718ab9ea500e3127827a4c9f524e7349193543b8e799c7d0aff0
SHA512d9dff63a02a840f66f8c7a986fefa7ad0ce77c119f6fb62073001773bcbe3b2f95fe8c23b588f6436f42e54b781637bc35bd943add9f24d34238ce851ffabd53
-
Filesize
141KB
MD5e08a67d6cce20f6e03b56972702a75a8
SHA15b5b12101821823205103ff505da9c6b563c8a33
SHA2565ec5721701879cccc9e1c79e87ec27630e32e82e3ec3173e4dc73b987c11becc
SHA5120bf6aff56a732ebc795f050a7fa2a686202044662e05546f932ab1a6e847c4822f1da6b7baae3f3c36ea99f010a3a2b5ea7c6a474209ef9eb55e867dd46c967b