Overview
overview
10Static
static
302fdf4c910...66.exe
windows10-2004-x64
100be251d0ab...8e.exe
windows10-2004-x64
100e80ad3a8f...f6.exe
windows10-2004-x64
1016688c383c...d0.exe
windows10-2004-x64
102fad2d07bb...73.exe
windows10-2004-x64
102fe920abb6...a6.exe
windows10-2004-x64
1048143dd10c...4c.exe
windows10-2004-x64
104b7ea12db6...e4.exe
windows10-2004-x64
1052365e9025...44.exe
windows10-2004-x64
10695cd347d1...6a.exe
windows10-2004-x64
1087139651e5...22.exe
windows10-2004-x64
109e061347f6...86.exe
windows10-2004-x64
109ec41d0e12...a4.exe
windows10-2004-x64
10a68d0534de...a7.exe
windows10-2004-x64
10b480c9cd31...f3.exe
windows10-2004-x64
10cf449b541f...5e.exe
windows10-2004-x64
10d8a34be272...bd.exe
windows10-2004-x64
7e303858850...2c.exe
windows10-2004-x64
10feb3084f5c...99.exe
windows10-2004-x64
10ff0593e795...5f.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
02fdf4c9103ebcca7b26adc9161a504fa42c4a825a66d1c39221891576c0f866.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0be251d0ab9bbcdf4e410ed6872fcb32d854da896cf79b561b30639bf6d7c48e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
0e80ad3a8f8f885a60f3f6210a2c5e9d2cb05a18b779d36f8aae8206aebbf0f6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2fad2d07bb60b8be9b65ca9944135ee7696d7d2d8b32cdd3b5cf49e79641ae73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2fe920abb67663cc154599076d351357cc5282ac2505d5c20990fb89b97853a6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
48143dd10cb17672737bf39325eefbced2eac21f1831cda9176650d72814984c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4b7ea12db629e57826906a92344722cd83a635004026635b2ca16c24e67dbde4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
52365e902526bb91828ec4b8904240033cb658cf61b7ec8ee9189f96d3e93e44.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
695cd347d1d92d0b9066594b4970367e5d1c92c1b9b4885e6615432f165fc26a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
87139651e5e0bbbfe1bfa2f0a0607e9be351dbd75ab76f7846f919648224e922.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9e061347f64310d6e4bee03e70c36999f9e81fbcbba43f870f821e4fff10c686.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
a68d0534deb0e389e03aa786911c769caba8ce5acc03a27e3cfadf2a704811a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b480c9cd314e4d7d6a5d2b82b815eaccf37a30106d4a7f50993c34d6bd3466f3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d8a34be272e0dbfba0df5744bafa235f27121e065c13cb3620946ea7d15898bd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ff0593e795d855d33fe8872b94c0354d60cb3bf24a1af92da6667c6aec50325f.exe
Resource
win10v2004-20240508-en
General
-
Target
e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe
-
Size
1.2MB
-
MD5
12dc952ccbe66cc596b8fb68fd32209b
-
SHA1
2e170a590fb586d5b1ac04ee0539fa83b4f28bf2
-
SHA256
e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c
-
SHA512
213f0ce7763330641a9725eccc10c0e2ffb8d16b40458bc92cda66548d83d4ab1f082ca2699c84f1fd89fafaa10c836cb493e8422d960cab67e63aa032f43d48
-
SSDEEP
24576:PyxzHQw/Ut0++rFH644Fmb9gezT5b196DL11O:a/+w5WO9Lzha
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral18/memory/3928-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral18/memory/3928-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral18/memory/3928-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral18/files/0x0007000000023431-40.dat family_redline behavioral18/memory/4460-42-0x00000000002E0000-0x000000000031E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3964 Yz5NH5va.exe 4064 cH1HQ0rP.exe 4656 vM4Yw0Pl.exe 3152 Hg2ff0mu.exe 2316 1ZH07pt7.exe 4460 2Hr038vv.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Yz5NH5va.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" cH1HQ0rP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vM4Yw0Pl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Hg2ff0mu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2316 set thread context of 3928 2316 1ZH07pt7.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 1580 2316 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2492 wrote to memory of 3964 2492 e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe 82 PID 2492 wrote to memory of 3964 2492 e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe 82 PID 2492 wrote to memory of 3964 2492 e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe 82 PID 3964 wrote to memory of 4064 3964 Yz5NH5va.exe 83 PID 3964 wrote to memory of 4064 3964 Yz5NH5va.exe 83 PID 3964 wrote to memory of 4064 3964 Yz5NH5va.exe 83 PID 4064 wrote to memory of 4656 4064 cH1HQ0rP.exe 84 PID 4064 wrote to memory of 4656 4064 cH1HQ0rP.exe 84 PID 4064 wrote to memory of 4656 4064 cH1HQ0rP.exe 84 PID 4656 wrote to memory of 3152 4656 vM4Yw0Pl.exe 85 PID 4656 wrote to memory of 3152 4656 vM4Yw0Pl.exe 85 PID 4656 wrote to memory of 3152 4656 vM4Yw0Pl.exe 85 PID 3152 wrote to memory of 2316 3152 Hg2ff0mu.exe 86 PID 3152 wrote to memory of 2316 3152 Hg2ff0mu.exe 86 PID 3152 wrote to memory of 2316 3152 Hg2ff0mu.exe 86 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 2316 wrote to memory of 3928 2316 1ZH07pt7.exe 90 PID 3152 wrote to memory of 4460 3152 Hg2ff0mu.exe 94 PID 3152 wrote to memory of 4460 3152 Hg2ff0mu.exe 94 PID 3152 wrote to memory of 4460 3152 Hg2ff0mu.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe"C:\Users\Admin\AppData\Local\Temp\e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yz5NH5va.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yz5NH5va.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cH1HQ0rP.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cH1HQ0rP.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vM4Yw0Pl.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vM4Yw0Pl.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Hg2ff0mu.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Hg2ff0mu.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ZH07pt7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ZH07pt7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 2367⤵
- Program crash
PID:1580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Hr038vv.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Hr038vv.exe6⤵
- Executes dropped EXE
PID:4460
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2316 -ip 23161⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD567b10dab1fb4b1a8c21615f4bddaf162
SHA1ea7833f28d86a526ba984ef810a526b8cb909edb
SHA25664aefe285822547b68158ba5eb7bee6a0f53623cd4ab210b606af82a55606bab
SHA512004d6d0b3a87e725285e5058c635cecd4bb874c72205716619a1149ec85ea2499c3351825882ac5dc6b8e57ce0594ba56a99248ed6d40a4a4804c6327c956245
-
Filesize
935KB
MD57c0497f8573044335075e5641f3eacc7
SHA1fd9774c562f0e9a20b7d8f7f9b43c105e54777ad
SHA256c4ae156cb097393c6bf99fe9cff0fb9417a261fb0b384383fc21ce3c7a8e52ac
SHA512c7f9fdf5ebf4c73d167ccf4ae88fba6a7528f453cff3a65b788f540f50f91e31442cd6269fd022b76f1d8face421e506248fbb3794df58348f5073f8d69632b5
-
Filesize
640KB
MD59bd1c77e9bc82daa593c6a4134b62151
SHA1468707095224d4a81312182a6063fd629cba8202
SHA25650ccd13a93924317dd1eeec2c73612b1a890a092827241a81add4633c1920102
SHA512e802dfb8dc3d02d5576836fb3a8c97b7ca8635b10598c027285d7ed33b8d8e9d6b2aaccb6a3f3141ba86a0023259f0cece108e7dfd40797cb7ef996eafe7856b
-
Filesize
443KB
MD56cee2e691468a994f173da6dd51e5690
SHA106d8c8827eb6b21a5f7e2b949035f55536e4a438
SHA256bf08861038e91fa6ce4d17abdd1657bd42be42f78a1d52f3c7ddfaa7d36992dd
SHA51263228456f218a0447cd8dafed4f95e75ffec26cc5eec6e560e64fffcd52500d51390d7a50637da92dfd525288653300fc83e82694554d93911abc4b6bca18411
-
Filesize
422KB
MD5f088c2a00b6e41e8f72a295dc440d039
SHA10b57ff1615d5da0fbde5f487680eeaa245a91bfc
SHA256121e6be18a1a2e44435f82273c652664427f65f9e6c4f497154d245cd472fb45
SHA5128131545dd6707fdfa683fce9d423bde2ca17b3500acb0ee4fbaff6fa53792a7b34046f154b5d26ed5e6b00244d948159b245f8b02795c5055850df9c5b243ee7
-
Filesize
222KB
MD5c5e52847cc612a0d8df4f38faffcc049
SHA102536ae8bfd363aa721b045cde4e9a3b5a9dec9b
SHA256f492a6d5e37a9b54df0ed43dd04c47cc8ba473b9186844b8179e4ff6cdfbc2ec
SHA5124b75e812d51d376b3f1b14b5b9d75cc4510288a0d79a21b139c61d3cde326672c7b8dcca2e8064776450da44a7ebd9ff48d1b9c70c953d05eab975d0aa52a9af