Overview
overview
10Static
static
30bd57c625c...1b.exe
windows10-2004-x64
100e85c02906...31.exe
windows10-2004-x64
101ad22f7c20...da.exe
windows10-2004-x64
102f0934382a...84.exe
windows7-x64
102f0934382a...84.exe
windows10-2004-x64
10421c712a06...0d.exe
windows10-2004-x64
104958361c2a...c0.exe
windows10-2004-x64
104ee34ec273...69.exe
windows10-2004-x64
1054ae781e47...0d.exe
windows10-2004-x64
10597fd86cf2...51.exe
windows10-2004-x64
105af8e5b632...c7.exe
windows10-2004-x64
105edd2b7f66...17.exe
windows10-2004-x64
105eee268a87...c9.exe
windows10-2004-x64
1065a4c04d9e...25.exe
windows10-2004-x64
106d2e6d5049...21.exe
windows10-2004-x64
1077dcf40927...b4.exe
windows10-2004-x64
108c279e4e62...12.exe
windows10-2004-x64
108ee3fa55ce...d5.exe
windows10-2004-x64
108efb2f072c...7a.exe
windows10-2004-x64
10a717651d7f...a0.exe
windows10-2004-x64
10cecc5213e2...a1.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
0bd57c625c8696f13dca81e807695648802ac535fabc2f383ee13c655c34c21b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0e85c029067c6b16235fdcf9b3b93f0b3aef80462a8991420b61166786a76d31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1ad22f7c20ecd9c3f25fef51c4432f8d6609d2a5f951e6a29ab4a3a9b7d2ebda.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2f0934382aee1d9b657ffa98a2699fe864ed0a5bf8e1fc03bdcd479244e27b84.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
2f0934382aee1d9b657ffa98a2699fe864ed0a5bf8e1fc03bdcd479244e27b84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
421c712a06e641733de7dc086abdc66469eef71d8cf926aa756f0f6910cd6a0d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
4ee34ec273a7f43b89678eff087bf31e1b510415dcbb3ef6c8fcf0c06f036669.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
597fd86cf22402c976ac13f554867cf010ab3d5c9bdcf8d817c66e620dce4751.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5af8e5b632a39ba2220e0edd14997e390e73614f2bbcd55986f62325da0e16c7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
5edd2b7f663bf0a7b691bb6245a12b15994b2b4ad9c92c369111de2c68731917.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
5eee268a879c07625d7394a82b7c1c9212c1bd08e2f22fd5b294cc02b2f31cc9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
6d2e6d5049e4da686813824edc4aa0a843fff13079a0a9399739fe64efcfd021.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
77dcf409276e0e91ce08daea19f8477d18c5dba52a0ecbb55c40bc98744973b4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
8c279e4e627a1cf50482f625b1ee518eae0ac11a42f443c27e6f6ee04c180212.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
8ee3fa55ceed18988822ea9dd7e193a1c7e306b0010f172aee42ec3ddd3b2cd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
8efb2f072c814649d82dcf129f78158d28b7ec827dd8deeccf8e21e23771ae7a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
a717651d7fa6766bf2853b11671e7a5465fd6b8d88661bb92df08a819e765da0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
cecc5213e25a8a2dfe40b0f517d513ce319f2cdf28bcc26df3130a53a46d79a1.exe
Resource
win10v2004-20240508-en
General
-
Target
4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe
-
Size
1.1MB
-
MD5
0e9408c5a1d43eacf2a83efc8ec28403
-
SHA1
71c2d85e7c0d50ed22010a15493916d14344c19e
-
SHA256
4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0
-
SHA512
bb4db61931c6979ea415139b559fd69b832d9d3ddecf179e58ce44f8ec36c89943512e665eb22e70f4e75c48dc8a924d09d196139c923de08e7a9c8fc68842f6
-
SSDEEP
24576:byZ0Y6i41PZiAYvfcxG5u9aeOUBZS5UaB8PGFQo5n:OOvi4/iAYvUxOR2pTPGFJ5
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral7/memory/3504-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral7/memory/3504-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral7/memory/3504-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x0007000000023442-40.dat family_redline behavioral7/memory/2268-42-0x0000000000B70000-0x0000000000BAE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2336 Xi4QD2wJ.exe 3612 io5tb0FD.exe 4672 nX6Zt2bf.exe 776 zB7Vl6Ti.exe 1836 1cW36yn2.exe 2268 2fC063gW.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Xi4QD2wJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" io5tb0FD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" nX6Zt2bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" zB7Vl6Ti.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 3504 1836 1cW36yn2.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 4344 1836 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 5092 wrote to memory of 2336 5092 4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe 83 PID 5092 wrote to memory of 2336 5092 4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe 83 PID 5092 wrote to memory of 2336 5092 4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe 83 PID 2336 wrote to memory of 3612 2336 Xi4QD2wJ.exe 84 PID 2336 wrote to memory of 3612 2336 Xi4QD2wJ.exe 84 PID 2336 wrote to memory of 3612 2336 Xi4QD2wJ.exe 84 PID 3612 wrote to memory of 4672 3612 io5tb0FD.exe 85 PID 3612 wrote to memory of 4672 3612 io5tb0FD.exe 85 PID 3612 wrote to memory of 4672 3612 io5tb0FD.exe 85 PID 4672 wrote to memory of 776 4672 nX6Zt2bf.exe 87 PID 4672 wrote to memory of 776 4672 nX6Zt2bf.exe 87 PID 4672 wrote to memory of 776 4672 nX6Zt2bf.exe 87 PID 776 wrote to memory of 1836 776 zB7Vl6Ti.exe 88 PID 776 wrote to memory of 1836 776 zB7Vl6Ti.exe 88 PID 776 wrote to memory of 1836 776 zB7Vl6Ti.exe 88 PID 1836 wrote to memory of 2044 1836 1cW36yn2.exe 91 PID 1836 wrote to memory of 2044 1836 1cW36yn2.exe 91 PID 1836 wrote to memory of 2044 1836 1cW36yn2.exe 91 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 1836 wrote to memory of 3504 1836 1cW36yn2.exe 92 PID 776 wrote to memory of 2268 776 zB7Vl6Ti.exe 97 PID 776 wrote to memory of 2268 776 zB7Vl6Ti.exe 97 PID 776 wrote to memory of 2268 776 zB7Vl6Ti.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe"C:\Users\Admin\AppData\Local\Temp\4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xi4QD2wJ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xi4QD2wJ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\io5tb0FD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\io5tb0FD.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nX6Zt2bf.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nX6Zt2bf.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zB7Vl6Ti.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zB7Vl6Ti.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cW36yn2.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cW36yn2.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 6007⤵
- Program crash
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2fC063gW.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2fC063gW.exe6⤵
- Executes dropped EXE
PID:2268
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1836 -ip 18361⤵PID:1320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1001KB
MD5b8a8c75be882773e50038945aac7bb43
SHA1b50af0107edaaf6c0441ff5631072abfd47bad47
SHA25677ec06df7b750c75f64e81c0b521307b7ba1c68d28343fec6d5fa73ff3ca508f
SHA5120c50cb89567bacd3dca9dfb3da128d3a52dab29c2c1e3a61537edc5af96dd2e4b8ce67ff842453561a334e70fc10ed2a627cd3b84ed6aacbd30f2154e351c0dc
-
Filesize
811KB
MD5e395ae5e7f352059eff9bf2cce065e55
SHA14293a92e811c5e0b21d53d0cb889b8ded7bc6152
SHA2563c8be5b508cdc2194b05a105d6ff057c5234da2d724c43c66a9b62321e6e4c27
SHA5121e3345966f8a8aa221422c9a0d6bd8ac325ceb7be68f51387bbcf7186ace17963c2e4c2873329093c61d60e6067706698d34d16bb0f2fc3658490710d22ae1f1
-
Filesize
577KB
MD59d38cb7f6c83be302136f0da1c1f849f
SHA1975b3ebd62705a8ceb2e2d94aeb1b8253a02ee30
SHA2561349723e88b65f67dd77d8839796322a6fe54d0390f2ca8f664c79e041d20583
SHA512173305678e581804331b74f68cc9c63b6756c105a090f138c14e1db188790b145a072a362d7dd4e589d146b6d8f971e853df7eff25695871067be1b43d1c9cc3
-
Filesize
382KB
MD569503311cf02a9bee256e68bb6900d02
SHA171c10ee83fcf5766befcb7396138294b812654c5
SHA2563789187c5f7c77068c5c8438a5d5ef85bccd8403ab21870e3affc51204ef02bc
SHA512104319cd9a9060be64135ecc29b8dcf2fc3d214e728361df2ad4b45585cb981866e31afd1a5b01ed8ea936edbe16351a13dd5b80c784d93205c7774d6b77c6a8
-
Filesize
295KB
MD509245b1b46861d01f3dbea9bc3f6d90d
SHA1acfaeae86f444b91c5853d7ac80edc93e3e1391f
SHA256364d7e3a40c314339df5e3e60c4517f74eee767689b2824e85bfbcae091c3ca8
SHA51283a391e9c086d6bdf8ecf930ac2aa183b5153ef67addf959280749137782e11f84bcf2f5a9976f26fa552f0e870034a34de5c689327769c22ab7b5e52cecb37c
-
Filesize
222KB
MD555f47b913446fadf8267a530c5128d95
SHA128e916362aafe3d35328e22d264842f5897c70e2
SHA256d6bbe9b191f8037ceb5fd1d1b5266186b8ade1afa485cf9face779aea5f74257
SHA51201447d8fea35e429a6060a3886b69e1ae5e3bf0e5c1d9620e5846428d50ba72105578a0cb02e574e6c9253c4d1b2ca480d520f6d39839eb9a8d8c2b40193b0d1