Overview
overview
10Static
static
302fdf4c910...66.exe
windows10-2004-x64
100be251d0ab...8e.exe
windows10-2004-x64
100e80ad3a8f...f6.exe
windows10-2004-x64
1016688c383c...d0.exe
windows10-2004-x64
102fad2d07bb...73.exe
windows10-2004-x64
102fe920abb6...a6.exe
windows10-2004-x64
1048143dd10c...4c.exe
windows10-2004-x64
104b7ea12db6...e4.exe
windows10-2004-x64
1052365e9025...44.exe
windows10-2004-x64
10695cd347d1...6a.exe
windows10-2004-x64
1087139651e5...22.exe
windows10-2004-x64
109e061347f6...86.exe
windows10-2004-x64
109ec41d0e12...a4.exe
windows10-2004-x64
10a68d0534de...a7.exe
windows10-2004-x64
10b480c9cd31...f3.exe
windows10-2004-x64
10cf449b541f...5e.exe
windows10-2004-x64
10d8a34be272...bd.exe
windows10-2004-x64
7e303858850...2c.exe
windows10-2004-x64
10feb3084f5c...99.exe
windows10-2004-x64
10ff0593e795...5f.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
02fdf4c9103ebcca7b26adc9161a504fa42c4a825a66d1c39221891576c0f866.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0be251d0ab9bbcdf4e410ed6872fcb32d854da896cf79b561b30639bf6d7c48e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
0e80ad3a8f8f885a60f3f6210a2c5e9d2cb05a18b779d36f8aae8206aebbf0f6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
16688c383c392aa6325c78d89165cf92d6a9aa6243e19fe6c19d73fb522546d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2fad2d07bb60b8be9b65ca9944135ee7696d7d2d8b32cdd3b5cf49e79641ae73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2fe920abb67663cc154599076d351357cc5282ac2505d5c20990fb89b97853a6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
48143dd10cb17672737bf39325eefbced2eac21f1831cda9176650d72814984c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4b7ea12db629e57826906a92344722cd83a635004026635b2ca16c24e67dbde4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
52365e902526bb91828ec4b8904240033cb658cf61b7ec8ee9189f96d3e93e44.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
695cd347d1d92d0b9066594b4970367e5d1c92c1b9b4885e6615432f165fc26a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
87139651e5e0bbbfe1bfa2f0a0607e9be351dbd75ab76f7846f919648224e922.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9e061347f64310d6e4bee03e70c36999f9e81fbcbba43f870f821e4fff10c686.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9ec41d0e12fb2d169713827f9d9f6aea52f4b75e5343a74b114749220609bda4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
a68d0534deb0e389e03aa786911c769caba8ce5acc03a27e3cfadf2a704811a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b480c9cd314e4d7d6a5d2b82b815eaccf37a30106d4a7f50993c34d6bd3466f3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf449b541feb04da499c8d4ae8b93d871fe5c6772403b253da370ea358d20b5e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d8a34be272e0dbfba0df5744bafa235f27121e065c13cb3620946ea7d15898bd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3038588509eb9920f189d128da3a43d650c5a72fc8ad856641f6777809f702c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ff0593e795d855d33fe8872b94c0354d60cb3bf24a1af92da6667c6aec50325f.exe
Resource
win10v2004-20240508-en
General
-
Target
feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe
-
Size
939KB
-
MD5
65622bef79ddda9ce698926571ce25b1
-
SHA1
0b3e1903f85a04dc99e682a838f967878963e52e
-
SHA256
feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099
-
SHA512
a80b1a00117b003b3cf936e74f6b3502f5de4427761fd77576462388f9bb1173aeefe5344930284986b281c8d0ebced52da77108bfc41eeb7952aa79da17629f
-
SSDEEP
24576:jyIFsdExiJhBjUW6BsYe5HwA3O6Nf8sZ9X4u8:2geEEUjSYqHw8PNf8s1
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral19/memory/2420-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral19/memory/2420-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral19/memory/2420-29-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023426-33.dat family_redline behavioral19/memory/4048-35-0x0000000000170000-0x00000000001A0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 3620 x5242005.exe 1052 x6470292.exe 1480 x5285369.exe 948 g1443623.exe 4048 h8621055.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5242005.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6470292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5285369.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 948 set thread context of 2420 948 g1443623.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 928 948 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3620 3016 feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe 82 PID 3016 wrote to memory of 3620 3016 feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe 82 PID 3016 wrote to memory of 3620 3016 feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe 82 PID 3620 wrote to memory of 1052 3620 x5242005.exe 83 PID 3620 wrote to memory of 1052 3620 x5242005.exe 83 PID 3620 wrote to memory of 1052 3620 x5242005.exe 83 PID 1052 wrote to memory of 1480 1052 x6470292.exe 84 PID 1052 wrote to memory of 1480 1052 x6470292.exe 84 PID 1052 wrote to memory of 1480 1052 x6470292.exe 84 PID 1480 wrote to memory of 948 1480 x5285369.exe 85 PID 1480 wrote to memory of 948 1480 x5285369.exe 85 PID 1480 wrote to memory of 948 1480 x5285369.exe 85 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 948 wrote to memory of 2420 948 g1443623.exe 86 PID 1480 wrote to memory of 4048 1480 x5285369.exe 93 PID 1480 wrote to memory of 4048 1480 x5285369.exe 93 PID 1480 wrote to memory of 4048 1480 x5285369.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe"C:\Users\Admin\AppData\Local\Temp\feb3084f5c25ee7a6f595b0324d2f1b160f286a327d520b89a60520c6b5c9099.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5242005.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5242005.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6470292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6470292.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5285369.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5285369.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1443623.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1443623.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 5646⤵
- Program crash
PID:928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8621055.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8621055.exe5⤵
- Executes dropped EXE
PID:4048
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 948 -ip 9481⤵PID:916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD5ba730229223e0dc401d8793c3960a66e
SHA1a31fa10033a53413be6824d7907923ac85a9b748
SHA25688e94d8302b6a6daccef9c8ef1b66d9ea6eca47debf2e10078c81c464f33bd70
SHA5120ae5e91005d7927ba0c708871ce0d265ca08e7e65b8d37d40ad51a09c048e7b32b20cdc32c2035da451e1ddc57adc0e2c49b851a31f92f7353a82ce1aaa5a843
-
Filesize
563KB
MD568962378c4a1faae0b10f7895999caa1
SHA1a7f0159809355b1574455ba0bbf3c2515f4060e3
SHA2569f48a5bcea4f97b64fba26140aeea6f4183ada71d893eb29431b9c81852244fb
SHA512e1253afc5f3b0e60202e5446c0c5d76fb55b5796db2def1224b8a3dca74e8a615478a1ae3d951f730b44f580f46a69003150d7a3cf573f04c702653b5ef90ec0
-
Filesize
397KB
MD5c7c1c6e2dc0ab74c7d32611a58422518
SHA11d7609d51dca944592b8acbfb0ef3c1169e95464
SHA256912db92b8120a3438ff63e7fd3599960b886d1731fa00d106cb4e68f99434f67
SHA512b199be1cd9ccf164f4faedd600fe798d062058c39cf2931f616a6ea520fd3ff734d3b22a3aafd360584be14a2c50f2d1a49dc26e1dbca640f2efaf2b49925a26
-
Filesize
379KB
MD51d683ea5d43b913511532876dc0a295f
SHA1bbe929fb5c2b6baba85ae2c969963ade9139d970
SHA25695595031709fd4e81e46f58930e16120e76926a3d1325ff81a175986f3fa9c9d
SHA5128d066cfbbd4cef61fdf2f86f90a37fc88effea833d3e095edea2e2f377a75e48f5da9128564226db7f6f786ae7c8acc60d245fc0d1fc285ebcb7bee8b6babba9
-
Filesize
174KB
MD5b020d3c9a96bdd9a0161e2ed84883d7c
SHA12883c864f672952768f87aae0fb0eb6911aa79cb
SHA2569cba59684c5f6a1c5f3702d7cbcd6b11629c9c9944d1bdc941f55d02de322b57
SHA51222758f12334730cd12a0809d220ebc88f42555c29c1c8fa7e140e2caf4bf95cc9633b56a18e1b2c31e9905d0b1fe7615aacca2dd156c9668f32e5badd102f78a