Overview
overview
10Static
static
30fd60696a3...b2.exe
windows7-x64
100fd60696a3...b2.exe
windows10-2004-x64
102996639955...59.exe
windows10-2004-x64
102acc7bf3a0...77.exe
windows10-2004-x64
10526be697bf...a7.exe
windows10-2004-x64
10537d35bac5...43.exe
windows10-2004-x64
1063e7ea0ef8...61.exe
windows10-2004-x64
106ba7aab10c...ba.exe
windows10-2004-x64
106be7b83314...78.exe
windows10-2004-x64
108155bd24d1...a2.exe
windows10-2004-x64
1098093b29a1...be.exe
windows10-2004-x64
10a03054b15e...e0.exe
windows10-2004-x64
10a6ac7e6221...44.exe
windows10-2004-x64
10b4bd81eed4...04.exe
windows10-2004-x64
10bc3d05e882...1f.exe
windows10-2004-x64
10c423201e38...8d.exe
windows10-2004-x64
10c5e42a3a50...3e.exe
windows10-2004-x64
10cfb43a8521...b2.exe
windows10-2004-x64
10e50cb48894...49.exe
windows10-2004-x64
10e8168dd5ed...47.exe
windows10-2004-x64
10f674a21edd...53.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:30
Static task
static1
Behavioral task
behavioral1
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2acc7bf3a0c9793fa35ddb267e569c575a7a142b0722a61a3c49c2e87e994477.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
537d35bac51656a3d24c96fd5d730dbd1b3aa1e40870063892a5c0f247669243.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ba7aab10ca9c6b1705b9de79a2e324a956c2ef5b8210ba6a6fff04274d5a4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
8155bd24d116c57eab78ae836bd626ad73ea195b6cd88928129bb6fd1f3a80a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
98093b29a1c396935c62384ecd9e854458334f30f82f78a59ce3c0db9ddc54be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a03054b15e4fddd11bf2396780295da4431da23bddbec73b70a011da6d19a8e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a6ac7e6221ae1940e4e6faa06a2e255b4e9e7a811c7b3e3859feeaccca699844.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b4bd81eed44be3f83a4d778d3fe1bc914c1e5bca98bb8217707f964f5e0b0904.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c5e42a3a502b792f98bf1c2a5548dcfe3d99699a1ebd3b1dbbc5eebb02e0e13e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e50cb4889413649fb6e1cca1572c73dae745fb6ad9c37514bfa16650aacbaa49.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e8168dd5edaf1e8b049e5f5e7c1241a1e9e3c746375080bfc3d7dabb994bc847.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe
Resource
win10v2004-20240508-en
General
-
Target
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe
-
Size
1.3MB
-
MD5
b15dc7860f40ea21d727ada21c858d78
-
SHA1
10bfa760f1a369aaaad29f09084d4c5a2ecd7c61
-
SHA256
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61
-
SHA512
07b4a692a2db2e34c2ca0366e68a495021b4d7c799ebb49fae3f671e97d516f3e14edeb7a130a58bf4e4e3f73a2f4ecc379d2b498f762b20d173ee6b7de15ed8
-
SSDEEP
24576:Qy/hJhEvVPVCZ7m0CWm+hYWrvqfip2d69GPWFh31usKvGV:XfSVO7dyiYWbqfpVWssK+
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral7/memory/1544-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral7/memory/1544-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral7/memory/1544-37-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x000700000002343e-40.dat family_redline behavioral7/memory/2372-42-0x0000000000B90000-0x0000000000BCE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4240 Xy8QL8na.exe 628 jk2Vf8sZ.exe 3740 Gz8aU8XG.exe 2164 xw7wG0jr.exe 4404 1Df40Nt9.exe 2372 2cG651bP.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Xy8QL8na.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" jk2Vf8sZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Gz8aU8XG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" xw7wG0jr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4404 set thread context of 1544 4404 1Df40Nt9.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 3892 4404 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4352 wrote to memory of 4240 4352 63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe 84 PID 4352 wrote to memory of 4240 4352 63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe 84 PID 4352 wrote to memory of 4240 4352 63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe 84 PID 4240 wrote to memory of 628 4240 Xy8QL8na.exe 85 PID 4240 wrote to memory of 628 4240 Xy8QL8na.exe 85 PID 4240 wrote to memory of 628 4240 Xy8QL8na.exe 85 PID 628 wrote to memory of 3740 628 jk2Vf8sZ.exe 86 PID 628 wrote to memory of 3740 628 jk2Vf8sZ.exe 86 PID 628 wrote to memory of 3740 628 jk2Vf8sZ.exe 86 PID 3740 wrote to memory of 2164 3740 Gz8aU8XG.exe 87 PID 3740 wrote to memory of 2164 3740 Gz8aU8XG.exe 87 PID 3740 wrote to memory of 2164 3740 Gz8aU8XG.exe 87 PID 2164 wrote to memory of 4404 2164 xw7wG0jr.exe 89 PID 2164 wrote to memory of 4404 2164 xw7wG0jr.exe 89 PID 2164 wrote to memory of 4404 2164 xw7wG0jr.exe 89 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 4404 wrote to memory of 1544 4404 1Df40Nt9.exe 91 PID 2164 wrote to memory of 2372 2164 xw7wG0jr.exe 96 PID 2164 wrote to memory of 2372 2164 xw7wG0jr.exe 96 PID 2164 wrote to memory of 2372 2164 xw7wG0jr.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe"C:\Users\Admin\AppData\Local\Temp\63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xy8QL8na.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xy8QL8na.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jk2Vf8sZ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jk2Vf8sZ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Gz8aU8XG.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Gz8aU8XG.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\xw7wG0jr.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\xw7wG0jr.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Df40Nt9.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Df40Nt9.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 5927⤵
- Program crash
PID:3892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2cG651bP.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2cG651bP.exe6⤵
- Executes dropped EXE
PID:2372
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4404 -ip 44041⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50e2b7a00dfc8a77beb3eb29772253f2d
SHA1765576e2ae2ed8a2b8b251931049c553381d0064
SHA256121a86e82fabef1fd0e51e7e2f7c05de8391d3ee16c10449ba51a8ae829b4570
SHA5126021b7ede8af4d557634c1acac003ab1349d12c3560cce67868cb49ef8846c87f63c23d603728e8c6c3889e006ac8b2fbe35ffbfbc3aaabad98e87038e10dd31
-
Filesize
947KB
MD5ec690995b634ddc49df12be265aa426f
SHA134d99e2c55c8ad7c9ff6514b02ca507e1b9c5aa4
SHA256475759890c8525ac5d13b23b7cf911575fd0a3fcfa455204a2da2f9bf786942d
SHA5122dce1439f9019720633abe92be30d9a5990d4b2c53a5a3749306b7fba6d957c0a0e4c6b65541184ea41bd654c35be8ddd8eea9ba3abd26d04c6a4e81c90e2c0c
-
Filesize
645KB
MD5b39590fd6b2a12968b65a25c0fe4f5f0
SHA1fcdd1d4b96b0e4bb835b5f998288e7a4171c6fe1
SHA2567a8faa64cfe6b647412c252955dc72093d423a014cc7f436ae685137ac2ba95c
SHA512911c935174ea34ce7a3b21ef26de081c8d625d382f986123ae0bc277b8fcf4700d9184cf287b1f3d80cf6e1a65e946bd8ae68c2287561cefa20e792b6c94e8a9
-
Filesize
449KB
MD546290c0b53a8217bda01bd510a38a8d3
SHA185a1de7ff89d422698768d441229e65f55cba88e
SHA256ad28c4b0753c3919c855e407f0323bc927060f24c2cdb683d7cc392eb82a19f8
SHA5128e56b8157ba75c602ff4ba24fd4e4a63d8f050f1270be0929ed92fb4e7b545537f4be7bdb2df51710e5681e4366c3868b617bb9eb0ffe2035a3d452220c947a8
-
Filesize
446KB
MD54ec364f4492ada0565a5b47bc297fe25
SHA1c7ba7402b9e2848557df0f436fb3758f331861e3
SHA2568de06038d075d45fe13d9ad2cd49c94727a3d45c3da696e5c790b4b45dbb8726
SHA512f683f6d085a09fc561959eade281766ade498643f81da43e7acd05e59f1df87d9099fad6e564104a447dc36b0b66148dbe46c9c02e3d6036271f3b2358e38994
-
Filesize
222KB
MD59e616b1461cd5f4cbd366aab6aad1f33
SHA16a4995847e050c3d75808a008d9f73a053cabcb8
SHA256598b46561e1b8e350f5595c40b079b8a5933ec45f3d92da83488113b6a05fa62
SHA512acf06ea6d722ee66c54965db5bcf7b0f56ff10623a3eaa100abdb7f5e7ab25294cf435b79c6896f9920145bbc1de80d67bad0e4dcd092c1745a674de685207ef