Overview
overview
10Static
static
304a87b8f05...aa.exe
windows10-2004-x64
10114af5c13b...fd.exe
windows10-2004-x64
101e8dd381c7...01.exe
windows10-2004-x64
1022e22c4ac4...b8.exe
windows10-2004-x64
102539ef3c9e...7a.exe
windows10-2004-x64
1028e3223b75...cb.exe
windows10-2004-x64
102a370f0b1b...d2.exe
windows10-2004-x64
10312eee3369...2a.exe
windows10-2004-x64
1049fe85c527...13.exe
windows10-2004-x64
105b3b69df98...46.exe
windows10-2004-x64
1073935ea9dd...cf.exe
windows10-2004-x64
107afbfc55db...35.exe
windows10-2004-x64
107b920ad0a6...fd.exe
windows10-2004-x64
10867a7ac357...10.exe
windows10-2004-x64
10a69474bf18...5d.exe
windows10-2004-x64
10c1509297f2...7d.exe
windows10-2004-x64
10c1821fe13b...86.exe
windows10-2004-x64
10d431e54eb0...f6.exe
windows10-2004-x64
10e0e0fe767a...79.exe
windows10-2004-x64
10f1372b1a09...cc.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
114af5c13b66325340fcc0e38e22cb3c0a2f713ad1346010b0a9fc80f025e1fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1e8dd381c7b2d8b87f2596a2bfbccc3c813d8571fdbe788e678c3a733a5cae01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
22e22c4ac4de60508d13a9152534da8f1fe27d387785252b3e90c5daa1939eb8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2a370f0b1b44ffdfd5105d8de5cdb127afee410219b503b0620c23343a163ad2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5b3b69df98aea93f199289802070d29f0815829817936cfd60b3b627e0d20146.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7afbfc55db219ad6f0335344f7e4d1119a281a9e98656ca51496a2ccedc75d35.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
867a7ac357adfff48d6fc2820efa7db93b3c2303fa2c5f2570c1760004b2a310.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a69474bf18a7cca7eda490dd3a0e3f56de60989fbd935adbc91521cc640dd35d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c1509297f254a9c327f8d2f138ec5907931f396cedb4bb4796c5057e78cda87d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c1821fe13b3b9c1fc3fe603dfd3668b199fd7d6f671e0f72b8a9fff5a38fd286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e0e0fe767a4d28c22c9164941b937ca32139dda9a5ac00b380e14f39f0bc2e79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe
Resource
win10v2004-20240426-en
General
-
Target
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe
-
Size
1.2MB
-
MD5
7b68089b89d04dd24d22a1332d87cf08
-
SHA1
66d956dadfe8dc098330dc3ec94a6a625c6a0462
-
SHA256
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa
-
SHA512
0c1e561ae6e3c4111379c19618bc871c9c12b27ea5d2ae50396682e433e8369a97577e1b5f5ee3816fd2f4dfe2d8f749261a19c4cc20d0c517edfb282b45b592
-
SSDEEP
24576:dyXzrx5oWmhku7V5d2FZ9+p3tthEEovRH3OIspEK:4XJ5oJhR0Ff+t3EEopeIw
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3876-35-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/3876-36-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/3876-38-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2cX813nF.exe family_redline behavioral1/memory/2216-42-0x0000000000BF0000-0x0000000000C2E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
Gp6VD5cp.exeDi7kU6hV.exeQx0JO7Ga.exeOD7gs6lm.exe1Ou44cU8.exe2cX813nF.exepid process 2872 Gp6VD5cp.exe 1380 Di7kU6hV.exe 2192 Qx0JO7Ga.exe 3528 OD7gs6lm.exe 1232 1Ou44cU8.exe 2216 2cX813nF.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exeGp6VD5cp.exeDi7kU6hV.exeQx0JO7Ga.exeOD7gs6lm.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Gp6VD5cp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Di7kU6hV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Qx0JO7Ga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" OD7gs6lm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1Ou44cU8.exedescription pid process target process PID 1232 set thread context of 3876 1232 1Ou44cU8.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2636 1232 WerFault.exe 1Ou44cU8.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exeGp6VD5cp.exeDi7kU6hV.exeQx0JO7Ga.exeOD7gs6lm.exe1Ou44cU8.exedescription pid process target process PID 3312 wrote to memory of 2872 3312 04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe Gp6VD5cp.exe PID 3312 wrote to memory of 2872 3312 04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe Gp6VD5cp.exe PID 3312 wrote to memory of 2872 3312 04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe Gp6VD5cp.exe PID 2872 wrote to memory of 1380 2872 Gp6VD5cp.exe Di7kU6hV.exe PID 2872 wrote to memory of 1380 2872 Gp6VD5cp.exe Di7kU6hV.exe PID 2872 wrote to memory of 1380 2872 Gp6VD5cp.exe Di7kU6hV.exe PID 1380 wrote to memory of 2192 1380 Di7kU6hV.exe Qx0JO7Ga.exe PID 1380 wrote to memory of 2192 1380 Di7kU6hV.exe Qx0JO7Ga.exe PID 1380 wrote to memory of 2192 1380 Di7kU6hV.exe Qx0JO7Ga.exe PID 2192 wrote to memory of 3528 2192 Qx0JO7Ga.exe OD7gs6lm.exe PID 2192 wrote to memory of 3528 2192 Qx0JO7Ga.exe OD7gs6lm.exe PID 2192 wrote to memory of 3528 2192 Qx0JO7Ga.exe OD7gs6lm.exe PID 3528 wrote to memory of 1232 3528 OD7gs6lm.exe 1Ou44cU8.exe PID 3528 wrote to memory of 1232 3528 OD7gs6lm.exe 1Ou44cU8.exe PID 3528 wrote to memory of 1232 3528 OD7gs6lm.exe 1Ou44cU8.exe PID 1232 wrote to memory of 3464 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3464 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3464 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 1232 wrote to memory of 3876 1232 1Ou44cU8.exe AppLaunch.exe PID 3528 wrote to memory of 2216 3528 OD7gs6lm.exe 2cX813nF.exe PID 3528 wrote to memory of 2216 3528 OD7gs6lm.exe 2cX813nF.exe PID 3528 wrote to memory of 2216 3528 OD7gs6lm.exe 2cX813nF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe"C:\Users\Admin\AppData\Local\Temp\04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gp6VD5cp.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gp6VD5cp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Di7kU6hV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Di7kU6hV.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx0JO7Ga.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx0JO7Ga.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\OD7gs6lm.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\OD7gs6lm.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3464
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 6087⤵
- Program crash
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2cX813nF.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2cX813nF.exe6⤵
- Executes dropped EXE
PID:2216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1232 -ip 12321⤵PID:4660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4332,i,15721081447618313297,6839074028983272033,262144 --variations-seed-version --mojo-platform-channel-handle=3976 /prefetch:81⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5350a9aefb013b853f73d99cedd610549
SHA19b31e2f5ecd0d35f40ee4ef9b178065d015183b6
SHA2560708a0d94f95345b0f7971438db685a48b2fe9f61f2776bca56d20e6415ef320
SHA51258727bf11ace8b19aa4bb3064ef124fb7f240ec5e5083dc7ee7ab28d199f1003d7b90fd4c0cdcf8f11bf63b9cf2dd742881a109071f2c95fd72b16f49e7e14d2
-
Filesize
884KB
MD5faf29c5bfb1c743cfb4533d937cb948e
SHA10c6cbc17f12f05ed0901b26acbfd2c602d407259
SHA2568b23865c9d2ef9bb55779b50828a932163c41986847859fbf7a7aa7036a2b66a
SHA51299ea67c12671e2cd2185f6dc360fee776b0f5e3e984b4130889ba563d1e0293159451de135508cdd6ef5dff86f2f7290a208ac7dfd169d760192339fa94fe1f0
-
Filesize
590KB
MD50967c4ca01d4cba8a138452daad2a4b7
SHA16a9f5a8af4f8fbf4804001cd2eb47b4f27cbe9d2
SHA256b030de41361a5885ed02752bf9b2d11da1af3e778bbcc46a4c6f74976facf89b
SHA512c00a6d9e096ee77ffb4835ad16e1b517ebffad4282db226ed9f0c43f67d8950dd32b54310e0a66aebca1f091e017a885bc0664180673a3fafcc344c5d406f6e0
-
Filesize
417KB
MD53445d676db6b3d9d4928cbfdee5ce3be
SHA1fa37bee8ae0d2beeb22d5722648fd296df0decaa
SHA25690cc0eb1b01bca5b36373198fd7c25b5760042a69030929d29fbf03db7eaf894
SHA512a1d0d850f3b2145e3c3c7eb9112bea017e0c760591bb0c192b2437fca3513e5aa046d85360a006704b6ebc43981a03a4ee642172780a00f8dc31f562f1bfdf24
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
231KB
MD5d0165cebe4443ac7f5d2b8c85f89f3bd
SHA15caa5137538f3363cf02188bf59066ca351f5f1b
SHA25622b8bf3184007ff96e992a4b2aa7892b2463c49c9ebea52a21e8a3b774f9014a
SHA51275cbae061efb3a1acbbdf6f5becd9e96e57dd06fec84e22cde1bb735569160935f388899c4f7d0ef39e7cacacb5606f1e691b470823fc24dd5836fc0db0e4343