Overview
overview
10Static
static
30fd60696a3...b2.exe
windows7-x64
100fd60696a3...b2.exe
windows10-2004-x64
102996639955...59.exe
windows10-2004-x64
102acc7bf3a0...77.exe
windows10-2004-x64
10526be697bf...a7.exe
windows10-2004-x64
10537d35bac5...43.exe
windows10-2004-x64
1063e7ea0ef8...61.exe
windows10-2004-x64
106ba7aab10c...ba.exe
windows10-2004-x64
106be7b83314...78.exe
windows10-2004-x64
108155bd24d1...a2.exe
windows10-2004-x64
1098093b29a1...be.exe
windows10-2004-x64
10a03054b15e...e0.exe
windows10-2004-x64
10a6ac7e6221...44.exe
windows10-2004-x64
10b4bd81eed4...04.exe
windows10-2004-x64
10bc3d05e882...1f.exe
windows10-2004-x64
10c423201e38...8d.exe
windows10-2004-x64
10c5e42a3a50...3e.exe
windows10-2004-x64
10cfb43a8521...b2.exe
windows10-2004-x64
10e50cb48894...49.exe
windows10-2004-x64
10e8168dd5ed...47.exe
windows10-2004-x64
10f674a21edd...53.exe
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:30
Static task
static1
Behavioral task
behavioral1
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2acc7bf3a0c9793fa35ddb267e569c575a7a142b0722a61a3c49c2e87e994477.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
537d35bac51656a3d24c96fd5d730dbd1b3aa1e40870063892a5c0f247669243.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ba7aab10ca9c6b1705b9de79a2e324a956c2ef5b8210ba6a6fff04274d5a4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
8155bd24d116c57eab78ae836bd626ad73ea195b6cd88928129bb6fd1f3a80a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
98093b29a1c396935c62384ecd9e854458334f30f82f78a59ce3c0db9ddc54be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a03054b15e4fddd11bf2396780295da4431da23bddbec73b70a011da6d19a8e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a6ac7e6221ae1940e4e6faa06a2e255b4e9e7a811c7b3e3859feeaccca699844.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b4bd81eed44be3f83a4d778d3fe1bc914c1e5bca98bb8217707f964f5e0b0904.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c5e42a3a502b792f98bf1c2a5548dcfe3d99699a1ebd3b1dbbc5eebb02e0e13e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e50cb4889413649fb6e1cca1572c73dae745fb6ad9c37514bfa16650aacbaa49.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e8168dd5edaf1e8b049e5f5e7c1241a1e9e3c746375080bfc3d7dabb994bc847.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe
Resource
win10v2004-20240508-en
General
-
Target
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe
-
Size
815KB
-
MD5
5f588bc47b5093eaa5d3a9c0644b0fa6
-
SHA1
45386aff33a4247f8d51572f604b93a7c42ee96f
-
SHA256
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f
-
SHA512
6d0383da806a084f87f436ef1413c4d51f53c036c3b2fa06513f398ab8328793c910b775854fc6b512f6b33add8abc57660bf9612954420dc393c70661533ece
-
SSDEEP
24576:syeR6ovnaM19/cDqmCcYge61HxqCSKcORi:beR3rmIAHxkKcOR
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral15/memory/2968-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral15/memory/2968-25-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral15/memory/2968-23-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral15/memory/2968-22-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2BC962Kv.exe family_redline behavioral15/memory/3176-29-0x0000000000830000-0x000000000086E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
Qe0hI1mN.exemK8vD0SY.exe1NR02AN5.exe2BC962Kv.exepid process 5116 Qe0hI1mN.exe 2016 mK8vD0SY.exe 5092 1NR02AN5.exe 3176 2BC962Kv.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exeQe0hI1mN.exemK8vD0SY.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qe0hI1mN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" mK8vD0SY.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1NR02AN5.exedescription pid process target process PID 5092 set thread context of 2968 5092 1NR02AN5.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5108 5092 WerFault.exe 1NR02AN5.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exeQe0hI1mN.exemK8vD0SY.exe1NR02AN5.exedescription pid process target process PID 2492 wrote to memory of 5116 2492 bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe Qe0hI1mN.exe PID 2492 wrote to memory of 5116 2492 bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe Qe0hI1mN.exe PID 2492 wrote to memory of 5116 2492 bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe Qe0hI1mN.exe PID 5116 wrote to memory of 2016 5116 Qe0hI1mN.exe mK8vD0SY.exe PID 5116 wrote to memory of 2016 5116 Qe0hI1mN.exe mK8vD0SY.exe PID 5116 wrote to memory of 2016 5116 Qe0hI1mN.exe mK8vD0SY.exe PID 2016 wrote to memory of 5092 2016 mK8vD0SY.exe 1NR02AN5.exe PID 2016 wrote to memory of 5092 2016 mK8vD0SY.exe 1NR02AN5.exe PID 2016 wrote to memory of 5092 2016 mK8vD0SY.exe 1NR02AN5.exe PID 5092 wrote to memory of 3292 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 3292 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 3292 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 3540 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 3540 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 3540 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2164 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2164 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2164 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 780 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 780 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 780 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 5092 wrote to memory of 2968 5092 1NR02AN5.exe AppLaunch.exe PID 2016 wrote to memory of 3176 2016 mK8vD0SY.exe 2BC962Kv.exe PID 2016 wrote to memory of 3176 2016 mK8vD0SY.exe 2BC962Kv.exe PID 2016 wrote to memory of 3176 2016 mK8vD0SY.exe 2BC962Kv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe"C:\Users\Admin\AppData\Local\Temp\bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qe0hI1mN.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qe0hI1mN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mK8vD0SY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mK8vD0SY.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1NR02AN5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1NR02AN5.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3292
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3540
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2164
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:780
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 5925⤵
- Program crash
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2BC962Kv.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2BC962Kv.exe4⤵
- Executes dropped EXE
PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5092 -ip 50921⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
582KB
MD5f2a0b5a0e57ae53fbe24c0df2f1f9e5c
SHA1074a5a85bda75f8d4aca895020ccb0e5e02c6067
SHA256442682ff3cde8335f5b11488ea9fe2fe5700779fea6822aaa96a7911073373ad
SHA51252cf80745c0bc96b13e8957b757d8c9ed585db8e64e6eaabf61f50f49af564260fcb5fb8447d5b79d0e45787a6ffa78446e3ce2138edba016737a4881952f113
-
Filesize
382KB
MD5db7113700316e7b4258afce73e89f956
SHA1b7ed701196fa17805922fcf2af03adba119e5ae8
SHA2565a46cc9fd1016ca1e40d9399ba3b698075531e5567cf02e3ce7f8cd1eece3f4b
SHA512fed52fd13e6b4a158caa79dda42568c3eb89da7d1b2498a9b4d077224e907e530c85b35e6da726b88176ce961e46154208105911387a023d00a1a45324dd0238
-
Filesize
295KB
MD5fc07a394bba29c2849a0a56d1301b8f8
SHA1bdf41eaea67830a1fd90db6dea78ede186f45fea
SHA2567985b4073ca18e6b5f481a23889e852babf6d0e389e26fbf9415930f5cfc5cb1
SHA512e3d27ea55a378ea3a2a326fbc0e1e46898ce013b1b9c5c81233375a09c797fe242a2a388b5bd7bb5ca382ef91c1c6296ccfb107484a9f5e08a65173e9462ff0c
-
Filesize
222KB
MD5b226f0840e3d487ffba52528d4340435
SHA1d9e192a773e50e5add271e5470ddf6bb0b559108
SHA2569e348381f2695503b07539c143254b9d8dfd25787b35e08308e39c910ed64c46
SHA512da7c876b81651e28ac4957b892b175fec6fa083383c0f52f92209d353b935e742ae6ed25b4801ad227639d3024fde77ac3b363b3c34f53bc70801f0625147773