Overview
overview
10Static
static
30a827f3afc...35.exe
windows10-2004-x64
1018184ff5db...7a.exe
windows10-2004-x64
1036b2548e8c...4f.exe
windows10-2004-x64
104105a1b5cd...10.exe
windows10-2004-x64
105c5167b5fa...58.exe
windows10-2004-x64
1063e6b5c830...f8.exe
windows10-2004-x64
106c30cb0079...67.exe
windows7-x64
106c30cb0079...67.exe
windows10-2004-x64
106e83c409a5...45.exe
windows10-2004-x64
1077f90e3384...ff.exe
windows10-2004-x64
1078bd5cf504...7c.exe
windows10-2004-x64
107ce62a9574...e1.exe
windows10-2004-x64
107d2d45b593...66.exe
windows10-2004-x64
107d9b9686db...9b.exe
windows10-2004-x64
10864fdfc64c...f0.exe
windows10-2004-x64
109607b0ce5d...c6.exe
windows10-2004-x64
10aa524ac0a8...07.exe
windows10-2004-x64
10b6f332f02a...85.exe
windows10-2004-x64
10cfebef463c...dc.exe
windows10-2004-x64
10d0feb2ba6d...72.exe
windows10-2004-x64
10df0b96135e...51.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
18184ff5db7555b2c7baf1a87aa4d5046c77710bee4b4f39e6a131f30f418f7a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
36b2548e8cff694e8667d04ab33d149c6e8bc4cad4bc4adc501ac7c1189f6c4f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
4105a1b5cdeab0ddd1945cda27d5cdaea78ffeef93a6e4ea79194dfe247fa810.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5c5167b5fa76db29ca8ae12f128646effd9bcc1c8956371aaee13bddc98fbe58.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
63e6b5c83075ac978e67dd3e333b3a73cf6c4d1c644a3e8975acdc6fb9c7c1f8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
6c30cb007997032e419ad510193eb667e3f0e2f8af929be8fc9c20b3ae8f0467.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
6c30cb007997032e419ad510193eb667e3f0e2f8af929be8fc9c20b3ae8f0467.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6e83c409a5141acfb33dd664684ab352c7d7ecdc7a01189c46cf229a14f9b645.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
77f90e33849dda663fd4cda0660a634b060b4175b2e67325c1556e009c739dff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
78bd5cf504a3577dc9d7f80114d8adafdd8f12cb7f983f8814a107da3aca917c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7ce62a9574ca774ba9c6234c75799fd5cb2c153c6f1e40a65e1bea1a9c2219e1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7d2d45b5937ea290b091c8ccd70073bfedc220269f4ab6c1833823d1678ed166.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
7d9b9686dbe7185e907f691f010b2ffdd754b22bfd13757340c6d287bc7e459b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
864fdfc64cf28ad02bb956d55c2a2ce062a178c9a8ca6100f6534277ceedd3f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
9607b0ce5da9cdaed4a53ccbe60fb0d4863b49ad237993d21e1b23a6674e97c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
aa524ac0a848432537ae785725900e93cb6140ebd8edeace3fe041dd64b93f07.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
cfebef463cdc3659ceb74203574f47da9a4378aab8633dc93e49ef6b8641bcdc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d0feb2ba6d8db360600c65c0a9ff51f8124b12ca9b415bbfdedf54b559a9c672.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
df0b96135e1607d766af3caf4942e58032580d533155a67061447124b2259851.exe
Resource
win10v2004-20240426-en
General
-
Target
b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe
-
Size
1.3MB
-
MD5
39f0a05d9cffc6b37a511894b059bc41
-
SHA1
3824f46d185556377f522fa71219a8cffd91e1a6
-
SHA256
b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85
-
SHA512
e636d7bd05c3dea755dbc513f16799cb8f4104d8650df8d887ae283d2ef2a0e23699b819f96abd70a58f5447b094f5a14e8456aa982cc01e96154231b280246c
-
SSDEEP
24576:qyiD/od1RQ2QJvKWMY8INJwYVCTA+oYueiVPvZ11+7ebeyBDZ+yk1gaacvyZAhxG:xiL2RQ2QJv7bJsFoLnVPU7weyzuambqo
Malware Config
Extracted
redline
magia
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral18/files/0x0007000000023430-54.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1On31NB6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1On31NB6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1On31NB6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1On31NB6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1On31NB6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1On31NB6.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral18/memory/3708-63-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 1472 Qj3GX23.exe 3592 ee0yo00.exe 852 1On31NB6.exe 4804 2uI2487.exe 1648 3rj33fm.exe 4572 4QS842GM.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1On31NB6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1On31NB6.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qj3GX23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ee0yo00.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1648 set thread context of 3748 1648 3rj33fm.exe 97 PID 4572 set thread context of 3708 4572 4QS842GM.exe 103 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3992 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3132 1648 WerFault.exe 95 640 4572 WerFault.exe 101 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 852 1On31NB6.exe 852 1On31NB6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 852 1On31NB6.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4064 wrote to memory of 1472 4064 b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe 84 PID 4064 wrote to memory of 1472 4064 b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe 84 PID 4064 wrote to memory of 1472 4064 b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe 84 PID 1472 wrote to memory of 3592 1472 Qj3GX23.exe 85 PID 1472 wrote to memory of 3592 1472 Qj3GX23.exe 85 PID 1472 wrote to memory of 3592 1472 Qj3GX23.exe 85 PID 3592 wrote to memory of 852 3592 ee0yo00.exe 86 PID 3592 wrote to memory of 852 3592 ee0yo00.exe 86 PID 3592 wrote to memory of 852 3592 ee0yo00.exe 86 PID 3592 wrote to memory of 4804 3592 ee0yo00.exe 94 PID 3592 wrote to memory of 4804 3592 ee0yo00.exe 94 PID 3592 wrote to memory of 4804 3592 ee0yo00.exe 94 PID 1472 wrote to memory of 1648 1472 Qj3GX23.exe 95 PID 1472 wrote to memory of 1648 1472 Qj3GX23.exe 95 PID 1472 wrote to memory of 1648 1472 Qj3GX23.exe 95 PID 1648 wrote to memory of 3748 1648 3rj33fm.exe 97 PID 1648 wrote to memory of 3748 1648 3rj33fm.exe 97 PID 1648 wrote to memory of 3748 1648 3rj33fm.exe 97 PID 1648 wrote to memory of 3748 1648 3rj33fm.exe 97 PID 1648 wrote to memory of 3748 1648 3rj33fm.exe 97 PID 1648 wrote to memory of 3748 1648 3rj33fm.exe 97 PID 4064 wrote to memory of 4572 4064 b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe 101 PID 4064 wrote to memory of 4572 4064 b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe 101 PID 4064 wrote to memory of 4572 4064 b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe 101 PID 4572 wrote to memory of 3708 4572 4QS842GM.exe 103 PID 4572 wrote to memory of 3708 4572 4QS842GM.exe 103 PID 4572 wrote to memory of 3708 4572 4QS842GM.exe 103 PID 4572 wrote to memory of 3708 4572 4QS842GM.exe 103 PID 4572 wrote to memory of 3708 4572 4QS842GM.exe 103 PID 4572 wrote to memory of 3708 4572 4QS842GM.exe 103 PID 4572 wrote to memory of 3708 4572 4QS842GM.exe 103 PID 4572 wrote to memory of 3708 4572 4QS842GM.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe"C:\Users\Admin\AppData\Local\Temp\b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qj3GX23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qj3GX23.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ee0yo00.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ee0yo00.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1On31NB6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1On31NB6.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2uI2487.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2uI2487.exe4⤵
- Executes dropped EXE
PID:4804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3rj33fm.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3rj33fm.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1564⤵
- Program crash
PID:3132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4QS842GM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4QS842GM.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 1563⤵
- Program crash
PID:640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1648 -ip 16481⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4572 -ip 45721⤵PID:4584
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD52ef596caf586a00ad41681d9a05492b2
SHA1c1cefbe81175c03b729d96e081d2517d3d1d2923
SHA256007691b15b20a5cebbb44ac795914335d6870f94d19b76f2e630a74c10a3eb79
SHA512b122be68aaf80a0d797bb6859c9f02e07f40bcb592afcd56751f67fbea7233621c13106f0470afb75f7a23a0818e10bd88ce8fe17fa1d6a170b87aeaddcc7827
-
Filesize
840KB
MD54ac64322286cdd76fc76d93a3493340f
SHA196d9009b6da81a00a1dc09c5c71a8109f728807a
SHA256b7b797be20763b334a908922a8b46c61a7fc31cd2c0f1d526b51a6cd4ad34bd2
SHA51234f8cbc5f632bc661e1bad5da2f5264ce20655b246f0eca262086a60798156a98d4553856a743a056c2c38babe8575f5780125081b80259990abd227fa5f0bc6
-
Filesize
1.6MB
MD5f8821d06da1c3c9703408c7025e4688a
SHA18e975dae15234da1527cb677fbfd3b3156d5d0ff
SHA256603bcf0d4d324f35293e8fda18f89039c8f13447abc32c5af35a574e0c95c976
SHA51276800c612ab4ba3e9c1390328629c2a19b9ba73d8d46ba567b240be9cb1f036e50bc9e22eb770171ac41c94cb9577d94ac3b484352f8cc2ffd209acd843be3b2
-
Filesize
362KB
MD52a4e996e527c6f9fbf5e397c07ca2fc5
SHA1ad4a837471ba5dd5a9874cc8b8e9640e86986edd
SHA256bdc980bf53888e65880916f953a981fe7d4661e9ab9563601180b272c4a309a0
SHA5125b6d6ef9f0ad07c277770d9b130e70c0dc389c536da976fa65d8a315bbfa7125ce6959b9b77836b5df25f917d47cca26909cf2f1735ca91da10529a0c65f42a7
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84