Overview
overview
10Static
static
30fd60696a3...b2.exe
windows7-x64
100fd60696a3...b2.exe
windows10-2004-x64
102996639955...59.exe
windows10-2004-x64
102acc7bf3a0...77.exe
windows10-2004-x64
10526be697bf...a7.exe
windows10-2004-x64
10537d35bac5...43.exe
windows10-2004-x64
1063e7ea0ef8...61.exe
windows10-2004-x64
106ba7aab10c...ba.exe
windows10-2004-x64
106be7b83314...78.exe
windows10-2004-x64
108155bd24d1...a2.exe
windows10-2004-x64
1098093b29a1...be.exe
windows10-2004-x64
10a03054b15e...e0.exe
windows10-2004-x64
10a6ac7e6221...44.exe
windows10-2004-x64
10b4bd81eed4...04.exe
windows10-2004-x64
10bc3d05e882...1f.exe
windows10-2004-x64
10c423201e38...8d.exe
windows10-2004-x64
10c5e42a3a50...3e.exe
windows10-2004-x64
10cfb43a8521...b2.exe
windows10-2004-x64
10e50cb48894...49.exe
windows10-2004-x64
10e8168dd5ed...47.exe
windows10-2004-x64
10f674a21edd...53.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:30
Static task
static1
Behavioral task
behavioral1
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2acc7bf3a0c9793fa35ddb267e569c575a7a142b0722a61a3c49c2e87e994477.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
537d35bac51656a3d24c96fd5d730dbd1b3aa1e40870063892a5c0f247669243.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ba7aab10ca9c6b1705b9de79a2e324a956c2ef5b8210ba6a6fff04274d5a4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
8155bd24d116c57eab78ae836bd626ad73ea195b6cd88928129bb6fd1f3a80a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
98093b29a1c396935c62384ecd9e854458334f30f82f78a59ce3c0db9ddc54be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a03054b15e4fddd11bf2396780295da4431da23bddbec73b70a011da6d19a8e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a6ac7e6221ae1940e4e6faa06a2e255b4e9e7a811c7b3e3859feeaccca699844.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b4bd81eed44be3f83a4d778d3fe1bc914c1e5bca98bb8217707f964f5e0b0904.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c5e42a3a502b792f98bf1c2a5548dcfe3d99699a1ebd3b1dbbc5eebb02e0e13e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e50cb4889413649fb6e1cca1572c73dae745fb6ad9c37514bfa16650aacbaa49.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e8168dd5edaf1e8b049e5f5e7c1241a1e9e3c746375080bfc3d7dabb994bc847.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe
Resource
win10v2004-20240508-en
General
-
Target
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe
-
Size
1.1MB
-
MD5
18446e1501e63e0019b372fc4029f123
-
SHA1
c9d615ecc9559924632f68869510166c921dc59f
-
SHA256
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d
-
SHA512
05d3f76c722a465e23ecf0961021767a41e7abc2f1b1f13be75300b095521e2eb58e2159311403753429349176d6821e67dc5c8fa46486db71252dc9d30d81e9
-
SSDEEP
24576:pyMC4dJevkZml2/xU1WPWz6MuFZeVYOQrekxPuLuQGZyA3aM:cMCiJeMR/xU1WPe52sfkxPuLu/ZyAq
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral16/memory/3584-28-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/3584-31-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/3584-29-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral16/files/0x000700000002345f-33.dat family_redline behavioral16/memory/808-35-0x0000000000570000-0x00000000005AE000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 3268 Ms3Fv9aC.exe 1552 ei0lj2rP.exe 1220 hf7zo1TL.exe 3244 1eY25uB2.exe 808 2Uz875GZ.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ms3Fv9aC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ei0lj2rP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hf7zo1TL.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3244 set thread context of 3584 3244 1eY25uB2.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 3888 3244 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3268 3940 c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe 83 PID 3940 wrote to memory of 3268 3940 c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe 83 PID 3940 wrote to memory of 3268 3940 c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe 83 PID 3268 wrote to memory of 1552 3268 Ms3Fv9aC.exe 84 PID 3268 wrote to memory of 1552 3268 Ms3Fv9aC.exe 84 PID 3268 wrote to memory of 1552 3268 Ms3Fv9aC.exe 84 PID 1552 wrote to memory of 1220 1552 ei0lj2rP.exe 85 PID 1552 wrote to memory of 1220 1552 ei0lj2rP.exe 85 PID 1552 wrote to memory of 1220 1552 ei0lj2rP.exe 85 PID 1220 wrote to memory of 3244 1220 hf7zo1TL.exe 86 PID 1220 wrote to memory of 3244 1220 hf7zo1TL.exe 86 PID 1220 wrote to memory of 3244 1220 hf7zo1TL.exe 86 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 3244 wrote to memory of 3584 3244 1eY25uB2.exe 87 PID 1220 wrote to memory of 808 1220 hf7zo1TL.exe 94 PID 1220 wrote to memory of 808 1220 hf7zo1TL.exe 94 PID 1220 wrote to memory of 808 1220 hf7zo1TL.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe"C:\Users\Admin\AppData\Local\Temp\c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ms3Fv9aC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ms3Fv9aC.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ei0lj2rP.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ei0lj2rP.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hf7zo1TL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hf7zo1TL.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1eY25uB2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1eY25uB2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 5766⤵
- Program crash
PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uz875GZ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uz875GZ.exe5⤵
- Executes dropped EXE
PID:808
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3244 -ip 32441⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
935KB
MD5bbd85908ca92aa6aa27a6899fa22d74b
SHA134bdbb799fc7ac47d11722c067f123feb93c3650
SHA25677ca1d8953d3307ab484abae3520c9e7e9dc8cd77581092f8f4b40bbf8f5d2dc
SHA51290f8f0a86235b85a8207010d6806c2e78634056d9cd08ea1b189aa4b4297191b53ea4a76fa3f396187fcd537dcea7b6b1396d0c119e6efd2cf8be07d01a52f8d
-
Filesize
640KB
MD52bc0319ca1665fa752d4513a58e50fcb
SHA1837e7aa4150ddc0615151d573304b3c159bc1199
SHA256b3b5c8d36897b3ca83fb1c0b823fa70062c301932237490854402682dd2471d5
SHA51269442c31324aade62fe195d7ffb97c7579b5a39277ccb23b400e0cf076db73c7dbf42cac54dc8687fcea22138c22ecc7ccc7a4e8a062eada106de929626572af
-
Filesize
444KB
MD5551d774eb6c3b06dbbbe44abda890ac2
SHA13ccd898442a6e3373733d390e20249fe3c1b1cda
SHA256a29a3b17cca56eddbc758d8871638246f507f2270e2cf8afc9f28288fac28208
SHA5127a41240a5922f6eada5e784bfd12483f75b0306d6a71d10dc9f7f9dfa1bb930e0565da0fed356d44396dbf6af63bb51ee746d6e4484dcde518e426d8fab5349a
-
Filesize
423KB
MD5cd820868bf246502a0bb868c3a4ab2e3
SHA109d4677dea172d69e2053022cbdfc34d136762bc
SHA25627c40868c0ed0f61e92e70e04f035b09266fc57c8959888c04273e93e903cd5b
SHA5127853829fddea79e8b07cc4e7b7f242f25c03da90b7d59f74bc2a29840e0bc7ace937fe9a93b34a6cb9426dba8e1e12bab3caa155a8f86e2972ecf1149dad6b77
-
Filesize
221KB
MD5afbf0c047e06b6e558d65b89bd0053ec
SHA17f0db386359d1b2501b0b5cdd2c111a4a1cc8c4d
SHA256ad88d1556dc955751493cc6869f4a76c1c5256ac0dd2358768262f2dca1fca43
SHA512e564fe61dbb9bea5c17544ae89ca358f5f5ea8811d9b97785fde05d797a3b08b2a285eb948fa920a8ca587f786ea60210be760cc6cebe46a4de61080a67ec6f9