Overview
overview
10Static
static
304a87b8f05...aa.exe
windows10-2004-x64
10114af5c13b...fd.exe
windows10-2004-x64
101e8dd381c7...01.exe
windows10-2004-x64
1022e22c4ac4...b8.exe
windows10-2004-x64
102539ef3c9e...7a.exe
windows10-2004-x64
1028e3223b75...cb.exe
windows10-2004-x64
102a370f0b1b...d2.exe
windows10-2004-x64
10312eee3369...2a.exe
windows10-2004-x64
1049fe85c527...13.exe
windows10-2004-x64
105b3b69df98...46.exe
windows10-2004-x64
1073935ea9dd...cf.exe
windows10-2004-x64
107afbfc55db...35.exe
windows10-2004-x64
107b920ad0a6...fd.exe
windows10-2004-x64
10867a7ac357...10.exe
windows10-2004-x64
10a69474bf18...5d.exe
windows10-2004-x64
10c1509297f2...7d.exe
windows10-2004-x64
10c1821fe13b...86.exe
windows10-2004-x64
10d431e54eb0...f6.exe
windows10-2004-x64
10e0e0fe767a...79.exe
windows10-2004-x64
10f1372b1a09...cc.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
114af5c13b66325340fcc0e38e22cb3c0a2f713ad1346010b0a9fc80f025e1fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1e8dd381c7b2d8b87f2596a2bfbccc3c813d8571fdbe788e678c3a733a5cae01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
22e22c4ac4de60508d13a9152534da8f1fe27d387785252b3e90c5daa1939eb8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2a370f0b1b44ffdfd5105d8de5cdb127afee410219b503b0620c23343a163ad2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5b3b69df98aea93f199289802070d29f0815829817936cfd60b3b627e0d20146.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7afbfc55db219ad6f0335344f7e4d1119a281a9e98656ca51496a2ccedc75d35.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
867a7ac357adfff48d6fc2820efa7db93b3c2303fa2c5f2570c1760004b2a310.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a69474bf18a7cca7eda490dd3a0e3f56de60989fbd935adbc91521cc640dd35d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c1509297f254a9c327f8d2f138ec5907931f396cedb4bb4796c5057e78cda87d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c1821fe13b3b9c1fc3fe603dfd3668b199fd7d6f671e0f72b8a9fff5a38fd286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e0e0fe767a4d28c22c9164941b937ca32139dda9a5ac00b380e14f39f0bc2e79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe
Resource
win10v2004-20240426-en
General
-
Target
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe
-
Size
747KB
-
MD5
c433de9c0a0f7a20b28cf2b91f09db49
-
SHA1
a428304a4fdde5954e04ad84e432857a9da0d4a8
-
SHA256
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf
-
SHA512
641050f74b611c3b566290f4f466ea08f26145a3956ac2881b131635151b60caa70e6406642beaa864b273d8e812d6bf9e0781bad15c57c0c076165bc9cfeda5
-
SSDEEP
12288:6MrAy90F1LOzr6fDc67Zi2XabPD7z01KHlrdM3w1p2w73S1C+OMg7N5t9e:WyWk+r7Zi2ayKHvGo73S1C+OMEfe
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral11/memory/4500-54-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral11/memory/4500-57-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral11/memory/4500-55-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
Processes:
1BH01Qb3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1BH01Qb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1BH01Qb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1BH01Qb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1BH01Qb3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1BH01Qb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1BH01Qb3.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral11/memory/2444-61-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
df8Rb23.exe1BH01Qb3.exe2eA44rQ.exe3QD8902.exepid process 3248 df8Rb23.exe 932 1BH01Qb3.exe 2620 2eA44rQ.exe 1400 3QD8902.exe -
Processes:
1BH01Qb3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1BH01Qb3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1BH01Qb3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exedf8Rb23.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" df8Rb23.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2eA44rQ.exe3QD8902.exedescription pid process target process PID 2620 set thread context of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 1400 set thread context of 2444 1400 3QD8902.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2744 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1756 2620 WerFault.exe 2eA44rQ.exe 1960 1400 WerFault.exe 3QD8902.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1BH01Qb3.exepid process 932 1BH01Qb3.exe 932 1BH01Qb3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1BH01Qb3.exedescription pid process Token: SeDebugPrivilege 932 1BH01Qb3.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exedf8Rb23.exe2eA44rQ.exe3QD8902.exedescription pid process target process PID 4984 wrote to memory of 3248 4984 73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe df8Rb23.exe PID 4984 wrote to memory of 3248 4984 73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe df8Rb23.exe PID 4984 wrote to memory of 3248 4984 73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe df8Rb23.exe PID 3248 wrote to memory of 932 3248 df8Rb23.exe 1BH01Qb3.exe PID 3248 wrote to memory of 932 3248 df8Rb23.exe 1BH01Qb3.exe PID 3248 wrote to memory of 932 3248 df8Rb23.exe 1BH01Qb3.exe PID 3248 wrote to memory of 2620 3248 df8Rb23.exe 2eA44rQ.exe PID 3248 wrote to memory of 2620 3248 df8Rb23.exe 2eA44rQ.exe PID 3248 wrote to memory of 2620 3248 df8Rb23.exe 2eA44rQ.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 2620 wrote to memory of 4500 2620 2eA44rQ.exe AppLaunch.exe PID 4984 wrote to memory of 1400 4984 73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe 3QD8902.exe PID 4984 wrote to memory of 1400 4984 73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe 3QD8902.exe PID 4984 wrote to memory of 1400 4984 73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe 3QD8902.exe PID 1400 wrote to memory of 2444 1400 3QD8902.exe AppLaunch.exe PID 1400 wrote to memory of 2444 1400 3QD8902.exe AppLaunch.exe PID 1400 wrote to memory of 2444 1400 3QD8902.exe AppLaunch.exe PID 1400 wrote to memory of 2444 1400 3QD8902.exe AppLaunch.exe PID 1400 wrote to memory of 2444 1400 3QD8902.exe AppLaunch.exe PID 1400 wrote to memory of 2444 1400 3QD8902.exe AppLaunch.exe PID 1400 wrote to memory of 2444 1400 3QD8902.exe AppLaunch.exe PID 1400 wrote to memory of 2444 1400 3QD8902.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe"C:\Users\Admin\AppData\Local\Temp\73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\df8Rb23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\df8Rb23.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1BH01Qb3.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1BH01Qb3.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eA44rQ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eA44rQ.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 1524⤵
- Program crash
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3QD8902.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3QD8902.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1523⤵
- Program crash
PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2620 -ip 26201⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1400 -ip 14001⤵PID:1176
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD5a38ce3e2dc246d8e40f95186737c588f
SHA187eb3f865fdd506f345d1d586f4d8c4d490f669a
SHA256c42efcd5f53c75f36a6ed5c8f8be82359b848285ffb0fc5acc12fbd625c7028e
SHA5129b6dec7f0eaae988f522ec927e0082dd03ead7605387c52d6184ee899154c85e9f180622b7ca32377a9e9a0b1972e24131e0a47e2b27797c55736b25261d27c9
-
Filesize
452KB
MD5157072cd36de9231a92dd0e5381e7b38
SHA1cba43a3e1887d5d4ae4a598ca559632aabf7ba74
SHA25631c4e83d28c94e0693560e7ad3b97f8ceb8f37f71d78176601df6289970ac372
SHA51291dd600f665035d17508ff06df992026e4d4dbe0b0d8c1fe23ff29d9d248e92f0f6b715ba2d1712d0c8bdeb226ff4168132f40316c5e307d42c58a083b35dabf
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3