Overview
overview
10Static
static
302fdf4c910...66.exe
windows10-2004-x64
100be251d0ab...8e.exe
windows10-2004-x64
100e80ad3a8f...f6.exe
windows10-2004-x64
1016688c383c...d0.exe
windows10-2004-x64
102fad2d07bb...73.exe
windows10-2004-x64
102fe920abb6...a6.exe
windows10-2004-x64
1048143dd10c...4c.exe
windows10-2004-x64
104b7ea12db6...e4.exe
windows10-2004-x64
1052365e9025...44.exe
windows10-2004-x64
10695cd347d1...6a.exe
windows10-2004-x64
1087139651e5...22.exe
windows10-2004-x64
109e061347f6...86.exe
windows10-2004-x64
109ec41d0e12...a4.exe
windows10-2004-x64
10a68d0534de...a7.exe
windows10-2004-x64
10b480c9cd31...f3.exe
windows10-2004-x64
10cf449b541f...5e.exe
windows10-2004-x64
10d8a34be272...bd.exe
windows10-2004-x64
7e303858850...2c.exe
windows10-2004-x64
10feb3084f5c...99.exe
windows10-2004-x64
10ff0593e795...5f.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
02fdf4c9103ebcca7b26adc9161a504fa42c4a825a66d1c39221891576c0f866.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0be251d0ab9bbcdf4e410ed6872fcb32d854da896cf79b561b30639bf6d7c48e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
0e80ad3a8f8f885a60f3f6210a2c5e9d2cb05a18b779d36f8aae8206aebbf0f6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2fad2d07bb60b8be9b65ca9944135ee7696d7d2d8b32cdd3b5cf49e79641ae73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2fe920abb67663cc154599076d351357cc5282ac2505d5c20990fb89b97853a6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
48143dd10cb17672737bf39325eefbced2eac21f1831cda9176650d72814984c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4b7ea12db629e57826906a92344722cd83a635004026635b2ca16c24e67dbde4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
52365e902526bb91828ec4b8904240033cb658cf61b7ec8ee9189f96d3e93e44.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
695cd347d1d92d0b9066594b4970367e5d1c92c1b9b4885e6615432f165fc26a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
87139651e5e0bbbfe1bfa2f0a0607e9be351dbd75ab76f7846f919648224e922.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9e061347f64310d6e4bee03e70c36999f9e81fbcbba43f870f821e4fff10c686.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
a68d0534deb0e389e03aa786911c769caba8ce5acc03a27e3cfadf2a704811a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b480c9cd314e4d7d6a5d2b82b815eaccf37a30106d4a7f50993c34d6bd3466f3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d8a34be272e0dbfba0df5744bafa235f27121e065c13cb3620946ea7d15898bd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ff0593e795d855d33fe8872b94c0354d60cb3bf24a1af92da6667c6aec50325f.exe
Resource
win10v2004-20240508-en
General
-
Target
cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe
-
Size
920KB
-
MD5
0c6b96a4d0f47a8decf22abca83388ae
-
SHA1
bde728459843f820a93c841541c58c9e362ddc78
-
SHA256
cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e
-
SHA512
a9844bda6c240857fee414462d681e7efe0707bc7315f5a2a85d75602a73ea3475aca859bf339d140f2c677cd22289c4b80f15d3fbfcae1a76cb16d72c03da9f
-
SSDEEP
24576:3yTHh/JLWnFYKqf8YKictPcTznSx4vMMN1WNkjz7YB:CPKMyHYp1HWWXY
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral16/memory/1284-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/1284-23-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/1284-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/1284-25-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral16/files/0x000700000002343e-26.dat family_redline behavioral16/memory/4108-29-0x0000000000180000-0x00000000001BE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4064 wd1IH9xl.exe 3388 BB5Ct6bf.exe 5104 1Gt13zT6.exe 4108 2KF781qu.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" BB5Ct6bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" wd1IH9xl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5104 set thread context of 1284 5104 1Gt13zT6.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 1012 5104 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 32 wrote to memory of 4064 32 cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe 83 PID 32 wrote to memory of 4064 32 cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe 83 PID 32 wrote to memory of 4064 32 cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe 83 PID 4064 wrote to memory of 3388 4064 wd1IH9xl.exe 84 PID 4064 wrote to memory of 3388 4064 wd1IH9xl.exe 84 PID 4064 wrote to memory of 3388 4064 wd1IH9xl.exe 84 PID 3388 wrote to memory of 5104 3388 BB5Ct6bf.exe 85 PID 3388 wrote to memory of 5104 3388 BB5Ct6bf.exe 85 PID 3388 wrote to memory of 5104 3388 BB5Ct6bf.exe 85 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 5104 wrote to memory of 1284 5104 1Gt13zT6.exe 90 PID 3388 wrote to memory of 4108 3388 BB5Ct6bf.exe 94 PID 3388 wrote to memory of 4108 3388 BB5Ct6bf.exe 94 PID 3388 wrote to memory of 4108 3388 BB5Ct6bf.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe"C:\Users\Admin\AppData\Local\Temp\cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wd1IH9xl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wd1IH9xl.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BB5Ct6bf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BB5Ct6bf.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Gt13zT6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Gt13zT6.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1485⤵
- Program crash
PID:1012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2KF781qu.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2KF781qu.exe4⤵
- Executes dropped EXE
PID:4108
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5104 -ip 51041⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632KB
MD50079c04431a9093ae121fb296e6b0eed
SHA1d9e0e1b19ecc27dfa4f20a4fa87795a781f44775
SHA256fe979be36915c66b4e80f1108857658aa35150ebbd89034d4be1c4fa959c91d3
SHA5124020b5a7b7adb9523e35a5b4830e957df6fd5c5f406abae013a5827df8ce14f03677237da9a837f649293ed794f05a53976ed322942d3d7c0fb8d1928309394d
-
Filesize
436KB
MD5d213e2080232807a50a68cf06de48dd0
SHA1a09601da7b45676d1a3cb07d767e093399d14b60
SHA256f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b
SHA51203867c11eed2d693fc1cd81da1c8c29b74bb6c45ff4f608ceb5c411ef8d9ba6e8fbad68a17bd4558c2055aa8258e1b39e24daca8d18558912ae0d6e7f16673d2
-
Filesize
407KB
MD5c4f75f4b0ff938695609a2ea3e7537e8
SHA10a86bcdf06134008d592a425ce9f34f66120eb18
SHA2560968244472af3762bb29e125b6b66d6ffca7f0a039834f1436dd69c2c2e468ff
SHA512a3e8e23e12434cab015fe95ed5dbb0b420dd0c4a36a61e314d90382084d77231b67c16aaef6e4b630ffb901380d263402807ea74455352067a86e4eedbfe7f3f
-
Filesize
221KB
MD52518b6c23b3dbfab5ef7e0a9f51a8bc3
SHA12289c03e2654136a64aa1b8495c10137a37ffd39
SHA256cb6a55e7d2acfa3bab6c6f901e19a7be1a791765683755c2d0775c76104e6ecc
SHA512d31db3ede2e792f5c9732ccaa2b2345e87fec68ad859c1035ffae255d0abd4fa5559bb7494982b5c191e7dbc6f6478c2a054b323d9e63cb922a1ac1977592813