Overview
overview
10Static
static
302fdf4c910...66.exe
windows10-2004-x64
100be251d0ab...8e.exe
windows10-2004-x64
100e80ad3a8f...f6.exe
windows10-2004-x64
1016688c383c...d0.exe
windows10-2004-x64
102fad2d07bb...73.exe
windows10-2004-x64
102fe920abb6...a6.exe
windows10-2004-x64
1048143dd10c...4c.exe
windows10-2004-x64
104b7ea12db6...e4.exe
windows10-2004-x64
1052365e9025...44.exe
windows10-2004-x64
10695cd347d1...6a.exe
windows10-2004-x64
1087139651e5...22.exe
windows10-2004-x64
109e061347f6...86.exe
windows10-2004-x64
109ec41d0e12...a4.exe
windows10-2004-x64
10a68d0534de...a7.exe
windows10-2004-x64
10b480c9cd31...f3.exe
windows10-2004-x64
10cf449b541f...5e.exe
windows10-2004-x64
10d8a34be272...bd.exe
windows10-2004-x64
7e303858850...2c.exe
windows10-2004-x64
10feb3084f5c...99.exe
windows10-2004-x64
10ff0593e795...5f.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
02fdf4c9103ebcca7b26adc9161a504fa42c4a825a66d1c39221891576c0f866.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0be251d0ab9bbcdf4e410ed6872fcb32d854da896cf79b561b30639bf6d7c48e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
0e80ad3a8f8f885a60f3f6210a2c5e9d2cb05a18b779d36f8aae8206aebbf0f6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2fad2d07bb60b8be9b65ca9944135ee7696d7d2d8b32cdd3b5cf49e79641ae73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2fe920abb67663cc154599076d351357cc5282ac2505d5c20990fb89b97853a6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
48143dd10cb17672737bf39325eefbced2eac21f1831cda9176650d72814984c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4b7ea12db629e57826906a92344722cd83a635004026635b2ca16c24e67dbde4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
52365e902526bb91828ec4b8904240033cb658cf61b7ec8ee9189f96d3e93e44.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
695cd347d1d92d0b9066594b4970367e5d1c92c1b9b4885e6615432f165fc26a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
87139651e5e0bbbfe1bfa2f0a0607e9be351dbd75ab76f7846f919648224e922.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9e061347f64310d6e4bee03e70c36999f9e81fbcbba43f870f821e4fff10c686.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
a68d0534deb0e389e03aa786911c769caba8ce5acc03a27e3cfadf2a704811a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b480c9cd314e4d7d6a5d2b82b815eaccf37a30106d4a7f50993c34d6bd3466f3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d8a34be272e0dbfba0df5744bafa235f27121e065c13cb3620946ea7d15898bd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ff0593e795d855d33fe8872b94c0354d60cb3bf24a1af92da6667c6aec50325f.exe
Resource
win10v2004-20240508-en
General
-
Target
9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe
-
Size
742KB
-
MD5
f9a8fb0e8bc08416a56f6abadce7c209
-
SHA1
237564839550770c1347c3cf62997b953bc438b1
-
SHA256
9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4
-
SHA512
d11b6686e901c38c886a140d598cb2037b9c9eb8db8960dba0b17e77255bdcdbae141ba2b9f8c04abea07bc30bae3a776caa82d4e970c7587af5eaced6ea9d75
-
SSDEEP
12288:GMrwy90oeqm9YLhnjzaA/ZFqIk1WnL1ZGfgXPan44vrYuJvNUuC:OyLex6LhjzaOp5nL1ZQgA9TVvOP
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral13/memory/2780-25-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral13/memory/2780-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral13/memory/2780-26-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral13/memory/2736-36-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 3856 Ch4SS04.exe 4620 YR3Ih10.exe 5028 1aH22dc8.exe 4808 2Gq9069.exe 4268 3gD29pv.exe 3624 4yy799Rl.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ch4SS04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" YR3Ih10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5028 set thread context of 1364 5028 1aH22dc8.exe 89 PID 4808 set thread context of 2780 4808 2Gq9069.exe 95 PID 4268 set thread context of 1832 4268 3gD29pv.exe 100 PID 3624 set thread context of 2736 3624 4yy799Rl.exe 107 -
Program crash 4 IoCs
pid pid_target Process procid_target 3384 5028 WerFault.exe 84 4592 4808 WerFault.exe 93 2356 4268 WerFault.exe 98 4052 3624 WerFault.exe 105 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1364 AppLaunch.exe 1364 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 AppLaunch.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3856 2208 9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe 82 PID 2208 wrote to memory of 3856 2208 9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe 82 PID 2208 wrote to memory of 3856 2208 9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe 82 PID 3856 wrote to memory of 4620 3856 Ch4SS04.exe 83 PID 3856 wrote to memory of 4620 3856 Ch4SS04.exe 83 PID 3856 wrote to memory of 4620 3856 Ch4SS04.exe 83 PID 4620 wrote to memory of 5028 4620 YR3Ih10.exe 84 PID 4620 wrote to memory of 5028 4620 YR3Ih10.exe 84 PID 4620 wrote to memory of 5028 4620 YR3Ih10.exe 84 PID 5028 wrote to memory of 1364 5028 1aH22dc8.exe 89 PID 5028 wrote to memory of 1364 5028 1aH22dc8.exe 89 PID 5028 wrote to memory of 1364 5028 1aH22dc8.exe 89 PID 5028 wrote to memory of 1364 5028 1aH22dc8.exe 89 PID 5028 wrote to memory of 1364 5028 1aH22dc8.exe 89 PID 5028 wrote to memory of 1364 5028 1aH22dc8.exe 89 PID 5028 wrote to memory of 1364 5028 1aH22dc8.exe 89 PID 5028 wrote to memory of 1364 5028 1aH22dc8.exe 89 PID 4620 wrote to memory of 4808 4620 YR3Ih10.exe 93 PID 4620 wrote to memory of 4808 4620 YR3Ih10.exe 93 PID 4620 wrote to memory of 4808 4620 YR3Ih10.exe 93 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 4808 wrote to memory of 2780 4808 2Gq9069.exe 95 PID 3856 wrote to memory of 4268 3856 Ch4SS04.exe 98 PID 3856 wrote to memory of 4268 3856 Ch4SS04.exe 98 PID 3856 wrote to memory of 4268 3856 Ch4SS04.exe 98 PID 4268 wrote to memory of 1832 4268 3gD29pv.exe 100 PID 4268 wrote to memory of 1832 4268 3gD29pv.exe 100 PID 4268 wrote to memory of 1832 4268 3gD29pv.exe 100 PID 4268 wrote to memory of 1832 4268 3gD29pv.exe 100 PID 4268 wrote to memory of 1832 4268 3gD29pv.exe 100 PID 4268 wrote to memory of 1832 4268 3gD29pv.exe 100 PID 2208 wrote to memory of 3624 2208 9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe 105 PID 2208 wrote to memory of 3624 2208 9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe 105 PID 2208 wrote to memory of 3624 2208 9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe 105 PID 3624 wrote to memory of 2736 3624 4yy799Rl.exe 107 PID 3624 wrote to memory of 2736 3624 4yy799Rl.exe 107 PID 3624 wrote to memory of 2736 3624 4yy799Rl.exe 107 PID 3624 wrote to memory of 2736 3624 4yy799Rl.exe 107 PID 3624 wrote to memory of 2736 3624 4yy799Rl.exe 107 PID 3624 wrote to memory of 2736 3624 4yy799Rl.exe 107 PID 3624 wrote to memory of 2736 3624 4yy799Rl.exe 107 PID 3624 wrote to memory of 2736 3624 4yy799Rl.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe"C:\Users\Admin\AppData\Local\Temp\9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ch4SS04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ch4SS04.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YR3Ih10.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YR3Ih10.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1aH22dc8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1aH22dc8.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 5805⤵
- Program crash
PID:3384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Gq9069.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Gq9069.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 5845⤵
- Program crash
PID:4592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3gD29pv.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3gD29pv.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:1832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 1564⤵
- Program crash
PID:2356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4yy799Rl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4yy799Rl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 1483⤵
- Program crash
PID:4052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5028 -ip 50281⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4808 -ip 48081⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4268 -ip 42681⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3624 -ip 36241⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5a78a95bcd506cfea76978c1cd60f083c
SHA1e9c7f2bf4d4d6a0b3ad3a317de21e3fc07a88ec8
SHA256918382d098156337cb8a4e29ccd26d34bff173c79a42db500874fed67ce5f002
SHA5129abb7e669fc17f84540a54560be50c28c52a6c80203072828352bf93c1a331f7ed8aa34e2475205684368a43cff0ae22a7cd5b230470666e3a8b7983254b60e0
-
Filesize
508KB
MD5b27658884d00d0c579eb4e4626ae87ab
SHA1f8226231b17981df7bbc220d7fa0f03d0ac5ac1a
SHA256a08835ffc09be153086af2f9f90c8cb0df15241e57e28f25a16e2ac3f16974ff
SHA512ff1641592f655b192e4b7a6e51e10278a65e084432775b2e601a9884ec8313c2cf5c7046562634ab888ba834d302e8ada048db0f1f385c635096def36377ddf6
-
Filesize
145KB
MD5a9415ff452c695bd26c09bce9dc47b22
SHA14d454798821f79630abe5f0e8ccf0b8142bed80d
SHA256500857910497a811963df7fab4da4f687da985c29f9fc17f563805ba7dc0a8a8
SHA512b60f8389b9e2cb76be65718aa87e2de4a7b66f207e25db775c306638c84b3b808dd84e4f04e058aa680c84d15d3793aeedc015e89524d2ebf73212cda66bdd33
-
Filesize
324KB
MD574a3000341ae69b3236bc32f710be265
SHA1a55899ae63bd6dfde227637fc2d75e98ff570c4a
SHA256e44b6a948128f7680351db06f1840d037af8e0250ec54ed7cff963a8d357e403
SHA512d801582b29fde1740b688030de4cc43d031cad95f8e9330d1757e69e11ec41b5386b7e344fd8c4cdacbefa2cf1a19f58cb6601182c5bf232d9b4b3cf18c05d54
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
295KB
MD578076d1724db675d80d29a7a3ac4b8f4
SHA109599a4f261543155fd8e32274ec13b6e8883c89
SHA25617c90d5e7da9af1ed1247078cfbc87904f54bfba87c94965d35e041fb755d036
SHA512ffd90215bb74f51f79658dcb8648440b27b0c33a7c04bc718286f51db4e02cca0ab329a356373bd2edf27f445bcf9bc9d5d280ea5e2e1fbdaa50de02c5f650c3