Overview
overview
10Static
static
304a87b8f05...aa.exe
windows10-2004-x64
10114af5c13b...fd.exe
windows10-2004-x64
101e8dd381c7...01.exe
windows10-2004-x64
1022e22c4ac4...b8.exe
windows10-2004-x64
102539ef3c9e...7a.exe
windows10-2004-x64
1028e3223b75...cb.exe
windows10-2004-x64
102a370f0b1b...d2.exe
windows10-2004-x64
10312eee3369...2a.exe
windows10-2004-x64
1049fe85c527...13.exe
windows10-2004-x64
105b3b69df98...46.exe
windows10-2004-x64
1073935ea9dd...cf.exe
windows10-2004-x64
107afbfc55db...35.exe
windows10-2004-x64
107b920ad0a6...fd.exe
windows10-2004-x64
10867a7ac357...10.exe
windows10-2004-x64
10a69474bf18...5d.exe
windows10-2004-x64
10c1509297f2...7d.exe
windows10-2004-x64
10c1821fe13b...86.exe
windows10-2004-x64
10d431e54eb0...f6.exe
windows10-2004-x64
10e0e0fe767a...79.exe
windows10-2004-x64
10f1372b1a09...cc.exe
windows10-2004-x64
10Analysis
-
max time kernel
133s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
114af5c13b66325340fcc0e38e22cb3c0a2f713ad1346010b0a9fc80f025e1fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1e8dd381c7b2d8b87f2596a2bfbccc3c813d8571fdbe788e678c3a733a5cae01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
22e22c4ac4de60508d13a9152534da8f1fe27d387785252b3e90c5daa1939eb8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2a370f0b1b44ffdfd5105d8de5cdb127afee410219b503b0620c23343a163ad2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5b3b69df98aea93f199289802070d29f0815829817936cfd60b3b627e0d20146.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7afbfc55db219ad6f0335344f7e4d1119a281a9e98656ca51496a2ccedc75d35.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
867a7ac357adfff48d6fc2820efa7db93b3c2303fa2c5f2570c1760004b2a310.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a69474bf18a7cca7eda490dd3a0e3f56de60989fbd935adbc91521cc640dd35d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c1509297f254a9c327f8d2f138ec5907931f396cedb4bb4796c5057e78cda87d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c1821fe13b3b9c1fc3fe603dfd3668b199fd7d6f671e0f72b8a9fff5a38fd286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e0e0fe767a4d28c22c9164941b937ca32139dda9a5ac00b380e14f39f0bc2e79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe
Resource
win10v2004-20240426-en
General
-
Target
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe
-
Size
928KB
-
MD5
e43fb0ba3f42cba89a4e9de789df3038
-
SHA1
755650aaa84f385009c339954364c6593b174f20
-
SHA256
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb
-
SHA512
5c42eccc3bd51d0bfbaa2c80feca9a8dba9e84cd7d153011b936aca2aa22aab21aaa473ac436ccb03fe05d6e4f089ee42bfe20ac78fbc61f6c19266c615aa518
-
SSDEEP
24576:Jy2jAwbwPPXDKN+xl43wd1Q21uhEn4WTzbD1yMT/uDwMM+:8wbgP+2Hd1QquhI4i5yMT/HMM
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral6/memory/4048-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral6/memory/4048-29-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral6/memory/4048-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6629236.exe family_redline behavioral6/memory/2884-35-0x0000000000280000-0x00000000002B0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
x4216580.exex1014822.exex9417546.exeg5182699.exeh6629236.exepid process 3152 x4216580.exe 3468 x1014822.exe 4960 x9417546.exe 2764 g5182699.exe 2884 h6629236.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exex4216580.exex1014822.exex9417546.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4216580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1014822.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9417546.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g5182699.exedescription pid process target process PID 2764 set thread context of 4048 2764 g5182699.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3012 2764 WerFault.exe g5182699.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exex4216580.exex1014822.exex9417546.exeg5182699.exedescription pid process target process PID 3596 wrote to memory of 3152 3596 28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe x4216580.exe PID 3596 wrote to memory of 3152 3596 28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe x4216580.exe PID 3596 wrote to memory of 3152 3596 28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe x4216580.exe PID 3152 wrote to memory of 3468 3152 x4216580.exe x1014822.exe PID 3152 wrote to memory of 3468 3152 x4216580.exe x1014822.exe PID 3152 wrote to memory of 3468 3152 x4216580.exe x1014822.exe PID 3468 wrote to memory of 4960 3468 x1014822.exe x9417546.exe PID 3468 wrote to memory of 4960 3468 x1014822.exe x9417546.exe PID 3468 wrote to memory of 4960 3468 x1014822.exe x9417546.exe PID 4960 wrote to memory of 2764 4960 x9417546.exe g5182699.exe PID 4960 wrote to memory of 2764 4960 x9417546.exe g5182699.exe PID 4960 wrote to memory of 2764 4960 x9417546.exe g5182699.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 2764 wrote to memory of 4048 2764 g5182699.exe AppLaunch.exe PID 4960 wrote to memory of 2884 4960 x9417546.exe h6629236.exe PID 4960 wrote to memory of 2884 4960 x9417546.exe h6629236.exe PID 4960 wrote to memory of 2884 4960 x9417546.exe h6629236.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe"C:\Users\Admin\AppData\Local\Temp\28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4216580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4216580.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1014822.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1014822.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9417546.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9417546.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5182699.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5182699.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 5526⤵
- Program crash
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6629236.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6629236.exe5⤵
- Executes dropped EXE
PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2764 -ip 27641⤵PID:4300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5843537b046ac9669536d2a4000c6d684
SHA1a4ea07b19211a62d7bbf69d8b6ef392304b44e3e
SHA2562c70d8c5725417dd1e21f4e739c888dfb97d7f3f4b63e180e5d0cd057675d32c
SHA512b567d34da1ac0e279f3fc361286950ff42e4e398fe207ff2997c6a5c73edbd7ba0f2d472698de8b2e3b38762414740cdbc56b6d5701e5d7287158b037c6cf648
-
Filesize
556KB
MD53a01a88c12d28f6451e1e68f1cd50c47
SHA1134a0d0eff2e8ff71ea3aadd4844442a0a9c756a
SHA25603574285a2d12d6ba68b6e3d4712a23973f336203bdf728e412856a7f738a549
SHA512c78a966a3053413b86d06ccf25d4696da6577c2149178980803afaa1ad86f207d26037518b35531db99a227aaaaaebc4de4e3a4756e497dae1b4e8912f0cb35b
-
Filesize
390KB
MD5c6d3978f6a199e921f9cf2d1e190f30f
SHA186cf06f442283a2c0ce1e8d1d8411be14cc9e044
SHA256951b73cd3d9807e492f6267fa8f59c87e95207fe233964de3515b74eaa270163
SHA512349ba923cb1b2f6b5f9b1339bbc2ab1126f21030b1d9bd33477708c0f5c54bb97b3ac29047cf26a1beaf8ed0edc2a0eabb3eb08f5072a1e40e70efec98a5ec8b
-
Filesize
364KB
MD5b215b62979e1610afe5ee50a770dd5a6
SHA1ad0fdbe1ae10a5b6e9132b372f992d366882b980
SHA2561a596056a7e702482d8a7052fef47f67726ce4a091dd5503b78b1f0e5d8d78f2
SHA512a1771316b45af93d31fc3626ab3d208cc38ff86bc643035faa658765107efe7b3743487c5d8554dbfed5948f136088393de84e0a076e4bf44fae35fdd0ddfb49
-
Filesize
174KB
MD5c41dc6b3404b23cc2005f407d88e38e1
SHA11f72165bc51e723cbf40c5e40a3b701fc02b142d
SHA256779f5de18f9eada7d2f8a4fcf29f654f7befddb6070af14df3401643e780464a
SHA512148252a8e6e6f62083fdad8f38289023f85fec1ba085ed4caab11a8ff45ce03bd29b69d35813703b34ba31e627f9eaf32ad4b9953cb4d9c2b7103d86f596ebea