Overview
overview
10Static
static
30fd60696a3...b2.exe
windows7-x64
100fd60696a3...b2.exe
windows10-2004-x64
102996639955...59.exe
windows10-2004-x64
102acc7bf3a0...77.exe
windows10-2004-x64
10526be697bf...a7.exe
windows10-2004-x64
10537d35bac5...43.exe
windows10-2004-x64
1063e7ea0ef8...61.exe
windows10-2004-x64
106ba7aab10c...ba.exe
windows10-2004-x64
106be7b83314...78.exe
windows10-2004-x64
108155bd24d1...a2.exe
windows10-2004-x64
1098093b29a1...be.exe
windows10-2004-x64
10a03054b15e...e0.exe
windows10-2004-x64
10a6ac7e6221...44.exe
windows10-2004-x64
10b4bd81eed4...04.exe
windows10-2004-x64
10bc3d05e882...1f.exe
windows10-2004-x64
10c423201e38...8d.exe
windows10-2004-x64
10c5e42a3a50...3e.exe
windows10-2004-x64
10cfb43a8521...b2.exe
windows10-2004-x64
10e50cb48894...49.exe
windows10-2004-x64
10e8168dd5ed...47.exe
windows10-2004-x64
10f674a21edd...53.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:30
Static task
static1
Behavioral task
behavioral1
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2acc7bf3a0c9793fa35ddb267e569c575a7a142b0722a61a3c49c2e87e994477.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
537d35bac51656a3d24c96fd5d730dbd1b3aa1e40870063892a5c0f247669243.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ba7aab10ca9c6b1705b9de79a2e324a956c2ef5b8210ba6a6fff04274d5a4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
8155bd24d116c57eab78ae836bd626ad73ea195b6cd88928129bb6fd1f3a80a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
98093b29a1c396935c62384ecd9e854458334f30f82f78a59ce3c0db9ddc54be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a03054b15e4fddd11bf2396780295da4431da23bddbec73b70a011da6d19a8e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a6ac7e6221ae1940e4e6faa06a2e255b4e9e7a811c7b3e3859feeaccca699844.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b4bd81eed44be3f83a4d778d3fe1bc914c1e5bca98bb8217707f964f5e0b0904.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c5e42a3a502b792f98bf1c2a5548dcfe3d99699a1ebd3b1dbbc5eebb02e0e13e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e50cb4889413649fb6e1cca1572c73dae745fb6ad9c37514bfa16650aacbaa49.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e8168dd5edaf1e8b049e5f5e7c1241a1e9e3c746375080bfc3d7dabb994bc847.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe
Resource
win10v2004-20240508-en
General
-
Target
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe
-
Size
1.2MB
-
MD5
bdf7fc6e400c2bc8dafca00732a7b259
-
SHA1
75ba29a05598998dca24bb52c7d311a6fe219c48
-
SHA256
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7
-
SHA512
e13ce7b519e6da87493183e2699f38e5171359e8a824074e6d6e92ba1ad9d29b87db2ece73a79156168741e681728122bef2f666fc274deaf5c5306c41b476d0
-
SSDEEP
24576:7yWodOfzIjZJXcoF7shLxvqA1UcHD7qHINivyoma19je:uWvIZdrF7s1xvqKHD7qHIIvyDa19
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral5/memory/452-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral5/memory/452-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral5/memory/452-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral5/files/0x0007000000023450-40.dat family_redline behavioral5/memory/1364-42-0x00000000002F0000-0x000000000032E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2300 np0kT0LJ.exe 1864 Pt8iu6Yp.exe 4584 XE8tc0Nc.exe 2424 Gw0Ca5xM.exe 3692 1WV96ea9.exe 1364 2Mm690BL.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" np0kT0LJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Pt8iu6Yp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" XE8tc0Nc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Gw0Ca5xM.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3692 set thread context of 452 3692 1WV96ea9.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 4080 3692 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2300 1896 526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe 84 PID 1896 wrote to memory of 2300 1896 526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe 84 PID 1896 wrote to memory of 2300 1896 526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe 84 PID 2300 wrote to memory of 1864 2300 np0kT0LJ.exe 85 PID 2300 wrote to memory of 1864 2300 np0kT0LJ.exe 85 PID 2300 wrote to memory of 1864 2300 np0kT0LJ.exe 85 PID 1864 wrote to memory of 4584 1864 Pt8iu6Yp.exe 86 PID 1864 wrote to memory of 4584 1864 Pt8iu6Yp.exe 86 PID 1864 wrote to memory of 4584 1864 Pt8iu6Yp.exe 86 PID 4584 wrote to memory of 2424 4584 XE8tc0Nc.exe 87 PID 4584 wrote to memory of 2424 4584 XE8tc0Nc.exe 87 PID 4584 wrote to memory of 2424 4584 XE8tc0Nc.exe 87 PID 2424 wrote to memory of 3692 2424 Gw0Ca5xM.exe 88 PID 2424 wrote to memory of 3692 2424 Gw0Ca5xM.exe 88 PID 2424 wrote to memory of 3692 2424 Gw0Ca5xM.exe 88 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 3692 wrote to memory of 452 3692 1WV96ea9.exe 92 PID 2424 wrote to memory of 1364 2424 Gw0Ca5xM.exe 97 PID 2424 wrote to memory of 1364 2424 Gw0Ca5xM.exe 97 PID 2424 wrote to memory of 1364 2424 Gw0Ca5xM.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe"C:\Users\Admin\AppData\Local\Temp\526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\np0kT0LJ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\np0kT0LJ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pt8iu6Yp.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pt8iu6Yp.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XE8tc0Nc.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XE8tc0Nc.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Gw0Ca5xM.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Gw0Ca5xM.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1WV96ea9.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1WV96ea9.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 5927⤵
- Program crash
PID:4080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mm690BL.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mm690BL.exe6⤵
- Executes dropped EXE
PID:1364
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3692 -ip 36921⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD538d4617642d991ba91c8022248965256
SHA1be9a7449109bb0e49868e000b58582b9d12cf694
SHA2569be23839da2d01429bafced3c98a522008198bc52811b5e3876ad0d5def4b899
SHA512171cda5184c0350f522f3c5a509df5ca545bbe2619831fdbe29c7658e9ab03a25773e5efdd7a690edcb47277e85c385cdd89ebfce9d7a5c0d831c897d30bac59
-
Filesize
883KB
MD5b1b28885f23879361301c0be47a9eb92
SHA13dec5992819a7e3f21ed1e40176acff72e1681c6
SHA256539969d819fb8e1b7ac3dfabc3a5a1de81d6dcfb64a458986fb33c300f17bbba
SHA51229bbb12bcc25feb8f7c08252711a909bf61db9af43dd269226163dcd51428ed2c5abe7b78d6d32652895469c1972fe1c2cdec6cb6fdbb433f9785f188d0c8dd0
-
Filesize
590KB
MD54731613dbaf4d2a2f6714f902936f034
SHA19a6d29ffd939e978af62e2e06033b2f4f280017e
SHA2565dab0bf3bb1da6ff8f153d076bb74e62deae5b8ff5290f417f14528c3f4205eb
SHA512e88d8f6b43f34f96e5e3be66be09a8fbe23efbf4107ad3123cf7c860fa6766482b451e90f631ce7cfa417bd8ae4fda306d737562a44c068d3cdecbdbd3c71c70
-
Filesize
417KB
MD5a9e032e8b840ba9be29467b2cec7d064
SHA12e75b73ee8159cbd272d4d07bb9cc42a518dd9fe
SHA256bc1821a8177193e2638ad6fa7a7844079d80a8d61688d6799bc0e19c973151a7
SHA5122cfbd1b76da96b8756b2e28b4616765e370cf07b7f503f525f3b35624701c6c1ceeca1a8c7ed498926b10d21236311f6c49c6887e7ed90a4d0e619a581cd6c3b
-
Filesize
378KB
MD56b0426968d436077c45be812c9236a06
SHA19d7566f494a88d09e7b31f0765aba2c54dd96eef
SHA256d4046bab99dd1b244fe36b24db2a13cc9db5bc35a25c530a5b84a14839d9f169
SHA5129856e1bc3407e074a26163fec15ea54d49ec91e49b8df265133ecf527109bdb1a06f55656ff6e8a4b5fd48e402ed73ec1a0f3ef66cebd626f6f06d1e91c39fbb
-
Filesize
231KB
MD5932d7df73b1dfbcfec4858f5af30329a
SHA164381a37d9909d026d80ef7092994693d3a6e593
SHA256df254302a4798401b269840c1157238c3b5acd34fe70741d480b0227a317a6f0
SHA512c7dedf391760386acec3f4c8dbeec28c5cdf4a4b1468f4bec045c7f0b781c786cd6c80ea410abf62dbd1ad488532d0c598e6b0c470b555d70a50ca407a85ffd8