Overview
overview
10Static
static
30fd60696a3...b2.exe
windows7-x64
100fd60696a3...b2.exe
windows10-2004-x64
102996639955...59.exe
windows10-2004-x64
102acc7bf3a0...77.exe
windows10-2004-x64
10526be697bf...a7.exe
windows10-2004-x64
10537d35bac5...43.exe
windows10-2004-x64
1063e7ea0ef8...61.exe
windows10-2004-x64
106ba7aab10c...ba.exe
windows10-2004-x64
106be7b83314...78.exe
windows10-2004-x64
108155bd24d1...a2.exe
windows10-2004-x64
1098093b29a1...be.exe
windows10-2004-x64
10a03054b15e...e0.exe
windows10-2004-x64
10a6ac7e6221...44.exe
windows10-2004-x64
10b4bd81eed4...04.exe
windows10-2004-x64
10bc3d05e882...1f.exe
windows10-2004-x64
10c423201e38...8d.exe
windows10-2004-x64
10c5e42a3a50...3e.exe
windows10-2004-x64
10cfb43a8521...b2.exe
windows10-2004-x64
10e50cb48894...49.exe
windows10-2004-x64
10e8168dd5ed...47.exe
windows10-2004-x64
10f674a21edd...53.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:30
Static task
static1
Behavioral task
behavioral1
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2acc7bf3a0c9793fa35ddb267e569c575a7a142b0722a61a3c49c2e87e994477.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
537d35bac51656a3d24c96fd5d730dbd1b3aa1e40870063892a5c0f247669243.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ba7aab10ca9c6b1705b9de79a2e324a956c2ef5b8210ba6a6fff04274d5a4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
8155bd24d116c57eab78ae836bd626ad73ea195b6cd88928129bb6fd1f3a80a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
98093b29a1c396935c62384ecd9e854458334f30f82f78a59ce3c0db9ddc54be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a03054b15e4fddd11bf2396780295da4431da23bddbec73b70a011da6d19a8e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a6ac7e6221ae1940e4e6faa06a2e255b4e9e7a811c7b3e3859feeaccca699844.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b4bd81eed44be3f83a4d778d3fe1bc914c1e5bca98bb8217707f964f5e0b0904.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c5e42a3a502b792f98bf1c2a5548dcfe3d99699a1ebd3b1dbbc5eebb02e0e13e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e50cb4889413649fb6e1cca1572c73dae745fb6ad9c37514bfa16650aacbaa49.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e8168dd5edaf1e8b049e5f5e7c1241a1e9e3c746375080bfc3d7dabb994bc847.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe
Resource
win10v2004-20240508-en
General
-
Target
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe
-
Size
1.2MB
-
MD5
1052f8a9850ff2cdb3305c4693fb3bc2
-
SHA1
32363959f3f2db69aa1311d268affce5f7e5a130
-
SHA256
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2
-
SHA512
1f65110317fc5bea56d95df856de912aae3cbeea853d62fcbf0487d47de212fb95740d6400088177bd1a313932df06460547a68910b2d62d4362cb6d895908b7
-
SSDEEP
24576:Py8i+Ca4HSc3QJthXZ+8LKwtWPoq+aNQO418UgpMc/eSpQ:a8i+CmuqhJswvq7OO4WUa/eSp
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral18/memory/2168-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral18/memory/2168-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral18/memory/2168-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral18/files/0x0007000000023619-40.dat family_redline behavioral18/memory/516-42-0x0000000000C80000-0x0000000000CBE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3968 DR4Js2RZ.exe 3116 vu5oz0II.exe 1972 gq2QF8qe.exe 1472 tu4Rx4jE.exe 2492 1bc01Bf3.exe 516 2QV881ok.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" DR4Js2RZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vu5oz0II.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gq2QF8qe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" tu4Rx4jE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2492 set thread context of 2168 2492 1bc01Bf3.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 1072 2492 WerFault.exe 94 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4236 wrote to memory of 3968 4236 cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe 90 PID 4236 wrote to memory of 3968 4236 cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe 90 PID 4236 wrote to memory of 3968 4236 cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe 90 PID 3968 wrote to memory of 3116 3968 DR4Js2RZ.exe 91 PID 3968 wrote to memory of 3116 3968 DR4Js2RZ.exe 91 PID 3968 wrote to memory of 3116 3968 DR4Js2RZ.exe 91 PID 3116 wrote to memory of 1972 3116 vu5oz0II.exe 92 PID 3116 wrote to memory of 1972 3116 vu5oz0II.exe 92 PID 3116 wrote to memory of 1972 3116 vu5oz0II.exe 92 PID 1972 wrote to memory of 1472 1972 gq2QF8qe.exe 93 PID 1972 wrote to memory of 1472 1972 gq2QF8qe.exe 93 PID 1972 wrote to memory of 1472 1972 gq2QF8qe.exe 93 PID 1472 wrote to memory of 2492 1472 tu4Rx4jE.exe 94 PID 1472 wrote to memory of 2492 1472 tu4Rx4jE.exe 94 PID 1472 wrote to memory of 2492 1472 tu4Rx4jE.exe 94 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 2492 wrote to memory of 2168 2492 1bc01Bf3.exe 97 PID 1472 wrote to memory of 516 1472 tu4Rx4jE.exe 103 PID 1472 wrote to memory of 516 1472 tu4Rx4jE.exe 103 PID 1472 wrote to memory of 516 1472 tu4Rx4jE.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe"C:\Users\Admin\AppData\Local\Temp\cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DR4Js2RZ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DR4Js2RZ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vu5oz0II.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vu5oz0II.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gq2QF8qe.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gq2QF8qe.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tu4Rx4jE.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tu4Rx4jE.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bc01Bf3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bc01Bf3.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 5967⤵
- Program crash
PID:1072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QV881ok.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QV881ok.exe6⤵
- Executes dropped EXE
PID:516
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2492 -ip 24921⤵PID:2260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3756,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4332 /prefetch:81⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD50a41ad264f28d5bac008878258724c36
SHA195fc25fc8cd6aaa0ffc6e444dbe0587fbe7ab901
SHA25678c15c22931d8f8495bb47a9caa3d79ed1c3622beb62b47ccfea0a098aa85def
SHA512242ce7f52cacb37e773305cd6e65c2cb65ce713696afe6b13a9371fa44b3cef4b93505bdce3181ef9c286750d5d9d1808253fa0de990e06780073af411eacb36
-
Filesize
884KB
MD596db83d327c93a4fb7212f0f553e7de2
SHA18e8a2d9f2a9546d8003cc5f9f08a41acc64abd6c
SHA256d513154dad1489fdc8453b344ff96c6fb2c597ce590ad7c8e17e598ac0915ea6
SHA512b56aa38bcf058910713f65313abc83c3cae4191371c0d8cf90f61e8c1d2aba36054d7f37771607f1eea2934b31a06682a69333185281e27f17810ac2d2dfbebb
-
Filesize
590KB
MD591541a356aa833e317372955fc608c91
SHA13aa2b1ec921141f7a98784aafcb91398d767b0f3
SHA2563a2b688ff4f95b0362fc13e6e9daef69a48adfc1ac966408d916881296c1287f
SHA5120163e3f14babfaa7c4d58a4e5bc618fde5764ee2b228222971b668690275868d0a0d6b81c919c151b54591d8b130e5c38551f380dbc69bd27efa3e84497fc054
-
Filesize
417KB
MD5c15a13585420061933c2b1e3e61c3b37
SHA107f4537bd6f372694765d7ac425d2424a9293147
SHA25607e5e9eeb408cecb9698d888c7f7b109fea64003495532c8fc1784118bca02b7
SHA512ce8c4331217b10ad2752369485cb36811a31402c188cff20bb8068f72067d455d9af2c2ef7b38b19398eb4da983e16383b772274b97cbca5225b5080b30fafeb
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
231KB
MD580f0a7d60ab9bdeb6af6b3565e6a32b4
SHA1e965b40b6929e60f3ccd39c5d3e97165e960ff80
SHA256f59d1f9b8fc4bbaf6edb887224abe2ced9ab9d00147ad4b62c1ace301dbd05be
SHA51255d4f1dd597356d3b2666ea3a1aff52276cee7489e0e168c7718c37900b30df1c0a2dd806e39bfc6b6c55fbab79eb6ce5d916f3252701834e365c2266abee490