Overview
overview
10Static
static
3196993766d...e4.exe
windows10-2004-x64
102cb02eeff0...07.exe
windows10-2004-x64
10515ca9dbb0...70.exe
windows10-2004-x64
10637e68df5f...fc.exe
windows10-2004-x64
1067adfef018...3f.exe
windows10-2004-x64
10753ea0d141...ee.exe
windows10-2004-x64
1075a099d51b...a2.exe
windows10-2004-x64
107bc60a53f2...61.exe
windows10-2004-x64
10878c11674c...59.exe
windows10-2004-x64
10905a82b666...03.exe
windows10-2004-x64
109e0acffebc...ef.exe
windows10-2004-x64
109e61b06119...c5.exe
windows10-2004-x64
10a8e7ed480b...c2.exe
windows10-2004-x64
10b55e0e5824...a8.exe
windows10-2004-x64
10b6f3ae7c80...fd.exe
windows10-2004-x64
10c3d6d3e893...ba.exe
windows10-2004-x64
10d68f556e86...13.exe
windows10-2004-x64
10f67e1f80fb...aa.exe
windows10-2004-x64
10fb8a184cad...cb.exe
windows10-2004-x64
10fe5b99ae2f...bb.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
196993766d9fd8e527e04ab6a57e61f104a8d6b651d9eff81ea121f7261d88e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2cb02eeff015b5724c548dcd8876db39d785c6beedf358fa6fa4dc6934541b07.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
67adfef0180eabce1681648e2c46c32d12d6f42f83d1e0f23337cb248ea7503f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
753ea0d14181cbd10e784c6def975e1b2a0adae8cdb71930dececfc455cd59ee.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
75a099d51b4f58a6df537c770b8d75820445fa7798e533b8d2312b46e4d407a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
878c11674c0d8a2d45512540cc40d386c9d9226a6518be88109168224c8be159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9e61b06119f566b9fb98b46bbce9cb6e128f7a58de8e4266a2867a96d521f2c5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a8e7ed480b5dfd7831f86d676442a11db9686f0cd83ee01f32b92a8a254080c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b6f3ae7c8039baa6291649906002be6daa14265e311c369866980f296919acfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c3d6d3e893fd99f013083ef64a70f3ab8cfdb8848fd2fccbb6d2844033a3f4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d68f556e867c0edd6db1857c4fa9aa2c6410b74fde30d6438fe50ffcf382e413.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f67e1f80fbd3845a74490559e6a9ca3526fb093df5cd3852b6de4cd319d401aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe
Resource
win10v2004-20240226-en
General
-
Target
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe
-
Size
937KB
-
MD5
341be5311fd3e445027b944c6cd4adb0
-
SHA1
2ab8fbbcb9c37d9a6419b35933bbe2fe66562bae
-
SHA256
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc
-
SHA512
ede31ca7a634e39a45fcb8eab771fef2e8fe9628f92e4cd223fad8eab92e04e0db876e23368ed903acdd0d6020eb901990ccbe3a61b54b8a678f98e2ab48c07a
-
SSDEEP
12288:ZMrGy90ZFPeq0D7LLDORdNwOQ/fftX8C6mpcNKNN6chuXfuG4oQTlm6BVOpK53o:7y4eq0fn6zNwO6R6SN6co2GwlmZpQ3o
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral4/memory/4824-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral4/memory/4824-24-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral4/memory/4824-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral4/files/0x0007000000023421-27.dat family_redline behavioral4/memory/4200-28-0x00000000001B0000-0x00000000001EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4124 re7hu4SY.exe 3784 qQ2Gh6HC.exe 3896 1il77NP4.exe 4200 2Ib806Ti.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" qQ2Gh6HC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" re7hu4SY.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3896 set thread context of 4824 3896 1il77NP4.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 1708 3896 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4204 wrote to memory of 4124 4204 637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe 83 PID 4204 wrote to memory of 4124 4204 637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe 83 PID 4204 wrote to memory of 4124 4204 637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe 83 PID 4124 wrote to memory of 3784 4124 re7hu4SY.exe 84 PID 4124 wrote to memory of 3784 4124 re7hu4SY.exe 84 PID 4124 wrote to memory of 3784 4124 re7hu4SY.exe 84 PID 3784 wrote to memory of 3896 3784 qQ2Gh6HC.exe 85 PID 3784 wrote to memory of 3896 3784 qQ2Gh6HC.exe 85 PID 3784 wrote to memory of 3896 3784 qQ2Gh6HC.exe 85 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3896 wrote to memory of 4824 3896 1il77NP4.exe 86 PID 3784 wrote to memory of 4200 3784 qQ2Gh6HC.exe 90 PID 3784 wrote to memory of 4200 3784 qQ2Gh6HC.exe 90 PID 3784 wrote to memory of 4200 3784 qQ2Gh6HC.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe"C:\Users\Admin\AppData\Local\Temp\637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\re7hu4SY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\re7hu4SY.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qQ2Gh6HC.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qQ2Gh6HC.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1il77NP4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1il77NP4.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 6085⤵
- Program crash
PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Ib806Ti.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Ib806Ti.exe4⤵
- Executes dropped EXE
PID:4200
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3896 -ip 38961⤵PID:1140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD55a1c2448da849201ed2e5bbc440ff5fb
SHA1912a0792dde5f445954c3ad1a1ddd8afb0bd5e8d
SHA25632d97953350082e578e1fa1515479e203f331ee9772a058c08ee7fbf4fbc8557
SHA512957fd89634ef7e9101a74526448d7a83fd0ed5cbd0ce845c5976794c419b2215c964a8dded4dbf03733855de2ce4859cafaeb38efb365334bee5f62329c08f07
-
Filesize
444KB
MD543ee0b83a2884fae195be5f6672a69f5
SHA1a22bb349a95b490248a046c6dfdeddc82c34aa90
SHA256089a4a542813a20d334bfa7ed3d83af449824049e6bde1c6a7c56ec6672214f7
SHA51214fa044661e8384d823bfd97e8bbc41ceb71c0ed3394eb92114b1fb92e67760fd1eac44a35fb5e023cd4059a6c4a3e907cd1bf5adbf34497fb272877555e5550
-
Filesize
423KB
MD55ac361448d4bc054e4f7acf341df5130
SHA130f01d3a1e65776dfb816aad96ca0e6aae8a8886
SHA2566df68953d52dfb422c55baca720e570ac4ad2649b8e55d918051e25e3319b76b
SHA5128ce133c20fbf1682f529af2bdc943e9459d40874a4dbb0f1befb88e4cef15ca4138f69acd83e89103de67150d1fbfcc7d41ce9c5f749f5572bb64080182d6c44
-
Filesize
221KB
MD580e45222ef4d085f542fe044e32844fd
SHA12d7bedc4190ec0deeecbcf270f7407865d8074e8
SHA2560f433a5d9cf9e76a474109ff4086ace9792327eb924583fe6b39047031b34c7f
SHA512d36c4c28cc1c7cf99abde3c37f7f2e050eaa1a18dae3cc74bd692c0f6dabe614aa26b917ba5f03443991cb6e784fbb2492c173917adcb1cb668822bee553c94b