Overview
overview
10Static
static
304a87b8f05...aa.exe
windows10-2004-x64
10114af5c13b...fd.exe
windows10-2004-x64
101e8dd381c7...01.exe
windows10-2004-x64
1022e22c4ac4...b8.exe
windows10-2004-x64
102539ef3c9e...7a.exe
windows10-2004-x64
1028e3223b75...cb.exe
windows10-2004-x64
102a370f0b1b...d2.exe
windows10-2004-x64
10312eee3369...2a.exe
windows10-2004-x64
1049fe85c527...13.exe
windows10-2004-x64
105b3b69df98...46.exe
windows10-2004-x64
1073935ea9dd...cf.exe
windows10-2004-x64
107afbfc55db...35.exe
windows10-2004-x64
107b920ad0a6...fd.exe
windows10-2004-x64
10867a7ac357...10.exe
windows10-2004-x64
10a69474bf18...5d.exe
windows10-2004-x64
10c1509297f2...7d.exe
windows10-2004-x64
10c1821fe13b...86.exe
windows10-2004-x64
10d431e54eb0...f6.exe
windows10-2004-x64
10e0e0fe767a...79.exe
windows10-2004-x64
10f1372b1a09...cc.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
114af5c13b66325340fcc0e38e22cb3c0a2f713ad1346010b0a9fc80f025e1fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1e8dd381c7b2d8b87f2596a2bfbccc3c813d8571fdbe788e678c3a733a5cae01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
22e22c4ac4de60508d13a9152534da8f1fe27d387785252b3e90c5daa1939eb8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2a370f0b1b44ffdfd5105d8de5cdb127afee410219b503b0620c23343a163ad2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5b3b69df98aea93f199289802070d29f0815829817936cfd60b3b627e0d20146.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7afbfc55db219ad6f0335344f7e4d1119a281a9e98656ca51496a2ccedc75d35.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
867a7ac357adfff48d6fc2820efa7db93b3c2303fa2c5f2570c1760004b2a310.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a69474bf18a7cca7eda490dd3a0e3f56de60989fbd935adbc91521cc640dd35d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c1509297f254a9c327f8d2f138ec5907931f396cedb4bb4796c5057e78cda87d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c1821fe13b3b9c1fc3fe603dfd3668b199fd7d6f671e0f72b8a9fff5a38fd286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e0e0fe767a4d28c22c9164941b937ca32139dda9a5ac00b380e14f39f0bc2e79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe
Resource
win10v2004-20240426-en
General
-
Target
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe
-
Size
879KB
-
MD5
5c2b672966a5b08f397c249749e36103
-
SHA1
829b694f77f4f214acc9ef3018b132fba50f1c75
-
SHA256
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6
-
SHA512
35097dbd27313f2fdd16162b2d86ded90b7af56c62ae9f0e745d4824f4d006ac08d1351eec0f7a44548de164f87e362b7b0e7fc13cc8c6d0a62bdc9f138f0153
-
SSDEEP
12288:HMrXy90w08HiILJ6XikwJVIsXyerEXiNysVUXm80ZBctoRD34FMJNW5LQDgai+p:gyf08/LJCwzFrl/VvncSkMv4QDdr
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral18/memory/3292-21-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral18/memory/3292-24-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral18/memory/3292-23-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2He418an.exe family_redline behavioral18/memory/4108-28-0x0000000000F20000-0x0000000000F5E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
Uc9Ja2VN.exedq2wN7qZ.exe1Py46Nj3.exe2He418an.exepid process 8 Uc9Ja2VN.exe 3480 dq2wN7qZ.exe 4248 1Py46Nj3.exe 4108 2He418an.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
dq2wN7qZ.exed431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exeUc9Ja2VN.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dq2wN7qZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Uc9Ja2VN.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1Py46Nj3.exedescription pid process target process PID 4248 set thread context of 3292 4248 1Py46Nj3.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2804 4248 WerFault.exe 1Py46Nj3.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exeUc9Ja2VN.exedq2wN7qZ.exe1Py46Nj3.exedescription pid process target process PID 1648 wrote to memory of 8 1648 d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe Uc9Ja2VN.exe PID 1648 wrote to memory of 8 1648 d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe Uc9Ja2VN.exe PID 1648 wrote to memory of 8 1648 d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe Uc9Ja2VN.exe PID 8 wrote to memory of 3480 8 Uc9Ja2VN.exe dq2wN7qZ.exe PID 8 wrote to memory of 3480 8 Uc9Ja2VN.exe dq2wN7qZ.exe PID 8 wrote to memory of 3480 8 Uc9Ja2VN.exe dq2wN7qZ.exe PID 3480 wrote to memory of 4248 3480 dq2wN7qZ.exe 1Py46Nj3.exe PID 3480 wrote to memory of 4248 3480 dq2wN7qZ.exe 1Py46Nj3.exe PID 3480 wrote to memory of 4248 3480 dq2wN7qZ.exe 1Py46Nj3.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 4248 wrote to memory of 3292 4248 1Py46Nj3.exe AppLaunch.exe PID 3480 wrote to memory of 4108 3480 dq2wN7qZ.exe 2He418an.exe PID 3480 wrote to memory of 4108 3480 dq2wN7qZ.exe 2He418an.exe PID 3480 wrote to memory of 4108 3480 dq2wN7qZ.exe 2He418an.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe"C:\Users\Admin\AppData\Local\Temp\d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Uc9Ja2VN.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Uc9Ja2VN.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dq2wN7qZ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dq2wN7qZ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Py46Nj3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Py46Nj3.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 6005⤵
- Program crash
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2He418an.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2He418an.exe4⤵
- Executes dropped EXE
PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4248 -ip 42481⤵PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585KB
MD580b36d22cfcc195b87f2d11370dd5c5e
SHA11d6fa75fd66055e6b1c1f843f6972c713c3efbf1
SHA256bb55f1a201fa3d3a27fc36e5a65669666d22da37d4d0e7d0a5a3356de6acbd73
SHA512d6f4f109b3d83c17bb197646dc14b12deaef80bb2bb88428eaf0dc9e95994d02a1b6a6a97886fc7c1e6e71e4bfc5b13a8c5945c15752f7549ed898c94960875a
-
Filesize
412KB
MD5f0fcefc767584a8f99db7459d6214d5f
SHA11333a35c35c855262c21b8162b3e965f5ef6535e
SHA25677e41885e0e648842456e181648ad8729cd7ea24b4e8e353dda20d88d3c6c552
SHA512796b74fb5081478e40829becab80cf52543594477ea38641d1975b6942d468fb1c89467fb5bf6cdbda4813f022fcff44ec0b0f9d6bf582f8097df17303836124
-
Filesize
378KB
MD5c8c838184e3dc920cb4accacc0c1231d
SHA1ff97e857ecef259833a66aac7a51488c3f32d45c
SHA2560b25b91180e180073251ca6fbf96e511b8cc13fc62c67c4c3fafe2782c1eda4a
SHA51212573d5c0d039d4b8bb3b613df87e137cf3fdcaeb55cc12e7a029a004264c517bbcc9d5b6f323957e8a97d3201d103755d0c2c3aa242dc0f00793df6d1b72eb4
-
Filesize
221KB
MD57fcd3524a94e448cf45679cd4347c429
SHA19857d8ff154c8fb31ea9601ea2c13427d5d80e49
SHA256a0c10987cc2f34a0373299e92b4c7c71baf278632eda5bfc1681a451412171d1
SHA512173e28e665c3f056c1d824f40142c25fc4d6086415af206f9893e9578016dee21930a4f09014a5d0bff6634db6e64d0b7e319836f431acd080d0523ecd3c801d