Overview
overview
10Static
static
30e266a7216...9f.exe
windows10-2004-x64
100fed7be9f1...18.exe
windows10-2004-x64
1016ac715816...ea.exe
windows10-2004-x64
1026c470a8b0...9a.exe
windows10-2004-x64
102d47818e79...79.exe
windows10-2004-x64
102e6c446801...a5.exe
windows7-x64
102e6c446801...a5.exe
windows10-2004-x64
102f02d9074f...e7.exe
windows10-2004-x64
104d1fc94da1...dc.exe
windows10-2004-x64
10521f6870a3...07.exe
windows10-2004-x64
105e01d698ad...d1.exe
windows10-2004-x64
107dc4ebbe25...36.exe
windows10-2004-x64
10862a8f43d1...32.exe
windows10-2004-x64
10ba494624ee...0c.exe
windows10-2004-x64
10ba4c5213c0...28.exe
windows10-2004-x64
10bbfb7f577d...dc.exe
windows10-2004-x64
10be3d316058...ca.exe
windows10-2004-x64
10e1d166047d...d0.exe
windows10-2004-x64
10e56b24cbcd...10.exe
windows10-2004-x64
10ef4487829b...03.exe
windows10-2004-x64
10fdbb9a49cd...e7.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0e266a72166321124c500c505eac80a998786768d1c1e7be12c0c09adbdb969f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16ac715816f3482cfc24aaddcdcd5f3994bb21599090c021f66c1dce047523ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
26c470a8b0d923529cb630dee55e87b901f38e0ee675c3213b68e8b1db239e9a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
2f02d9074fc5208b7b3e27f59a5867d15d3e0fa8490020ad8680b051f00a27e7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4d1fc94da13e115d0cfb24b80df5875a92e199a440121a1fe8c37f1258ef23dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5e01d698adb505dae22bf133909e0103e980c2f29ad0c1eecdf47f2487dafed1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
862a8f43d1bd92e93fbfad58f9943a043f45ae975ab50181d393ffb2fa848532.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ba4c5213c01fa30e0752b610dd412c61729c7ecd046fa9a5bdde3b5bcccb9a28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
be3d3160582a8debaa43a4fd41c15c9912c7e9f9fd4b736991afb8ad220ebfca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e1d166047db27931c64d2750c2c0d4d27bb57655e624d6cd5eeed46b63a5cbd0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e56b24cbcd2f2dc78ead0bbfb6d673cbd44be4ae5db1dbbf9a1fdb709103d010.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ef4487829bbec1eb751da8fe7227f27dccd52cd7f16d1d5d8bdcd1af42b36903.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe
Resource
win10v2004-20240508-en
General
-
Target
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe
-
Size
1.1MB
-
MD5
5ecf660444c5950f928f231c59e01ccf
-
SHA1
e92ba6431c28dd0280de17dce1c27baa987cf6b4
-
SHA256
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307
-
SHA512
0d08a5e0668491ff40ea5d88664d1b7c8dd2d38e458c9650da98187c404d11743ddbe984cb43f417fa940ccf1574ee4d3ffc2c3ac3ab6fe045dbb51a722a9aca
-
SSDEEP
24576:UysGSudEAJQDdDAltf4x0WBCeDsRJh5bnzE6kwA24HgoHAYOKj:j9ldbJQBDAltf4xweWhZzbAd5N
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral10/memory/1116-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral10/memory/1116-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral10/memory/1116-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2gA840Qk.exe family_redline behavioral10/memory/3164-42-0x0000000000A60000-0x0000000000A9E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
PY7xi2EX.exeGq5LF2NL.exeGL2UB3gT.exeEr1Jb6pC.exe1fJ09tq5.exe2gA840Qk.exepid process 3684 PY7xi2EX.exe 4164 Gq5LF2NL.exe 4220 GL2UB3gT.exe 628 Er1Jb6pC.exe 5564 1fJ09tq5.exe 3164 2gA840Qk.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exePY7xi2EX.exeGq5LF2NL.exeGL2UB3gT.exeEr1Jb6pC.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" PY7xi2EX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Gq5LF2NL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" GL2UB3gT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Er1Jb6pC.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1fJ09tq5.exedescription pid process target process PID 5564 set thread context of 1116 5564 1fJ09tq5.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5100 5564 WerFault.exe 1fJ09tq5.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exePY7xi2EX.exeGq5LF2NL.exeGL2UB3gT.exeEr1Jb6pC.exe1fJ09tq5.exedescription pid process target process PID 3636 wrote to memory of 3684 3636 521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe PY7xi2EX.exe PID 3636 wrote to memory of 3684 3636 521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe PY7xi2EX.exe PID 3636 wrote to memory of 3684 3636 521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe PY7xi2EX.exe PID 3684 wrote to memory of 4164 3684 PY7xi2EX.exe Gq5LF2NL.exe PID 3684 wrote to memory of 4164 3684 PY7xi2EX.exe Gq5LF2NL.exe PID 3684 wrote to memory of 4164 3684 PY7xi2EX.exe Gq5LF2NL.exe PID 4164 wrote to memory of 4220 4164 Gq5LF2NL.exe GL2UB3gT.exe PID 4164 wrote to memory of 4220 4164 Gq5LF2NL.exe GL2UB3gT.exe PID 4164 wrote to memory of 4220 4164 Gq5LF2NL.exe GL2UB3gT.exe PID 4220 wrote to memory of 628 4220 GL2UB3gT.exe Er1Jb6pC.exe PID 4220 wrote to memory of 628 4220 GL2UB3gT.exe Er1Jb6pC.exe PID 4220 wrote to memory of 628 4220 GL2UB3gT.exe Er1Jb6pC.exe PID 628 wrote to memory of 5564 628 Er1Jb6pC.exe 1fJ09tq5.exe PID 628 wrote to memory of 5564 628 Er1Jb6pC.exe 1fJ09tq5.exe PID 628 wrote to memory of 5564 628 Er1Jb6pC.exe 1fJ09tq5.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 5564 wrote to memory of 1116 5564 1fJ09tq5.exe AppLaunch.exe PID 628 wrote to memory of 3164 628 Er1Jb6pC.exe 2gA840Qk.exe PID 628 wrote to memory of 3164 628 Er1Jb6pC.exe 2gA840Qk.exe PID 628 wrote to memory of 3164 628 Er1Jb6pC.exe 2gA840Qk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe"C:\Users\Admin\AppData\Local\Temp\521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PY7xi2EX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PY7xi2EX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gq5LF2NL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gq5LF2NL.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GL2UB3gT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GL2UB3gT.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Er1Jb6pC.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Er1Jb6pC.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fJ09tq5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fJ09tq5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5564 -s 2207⤵
- Program crash
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2gA840Qk.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2gA840Qk.exe6⤵
- Executes dropped EXE
PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5564 -ip 55641⤵PID:5680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5fa74448a1606535fa9a3b88bdb8da11a
SHA169d7a5deb58d80fb10385db3ca067e671827b0a8
SHA25664fe6ea989722a37b55c0911bca6d3ad5b5ffa04a643223c82bf7a247e85fb33
SHA512c8a0ff76876e30a6570138bb1c2867f5cd67c7a1614babbfff6e4f7e67c417197c7ddfe6833daa723b4898605ed9527d57db8fd93eddf048629e4ee7ee1637fb
-
Filesize
811KB
MD526cc005cb9fd1a174a6918f0ae152e9d
SHA19f24dcb866b25e8352955fa8ee824d1eaeade486
SHA256040350051a8ebe1bc763d8eb4d493bee7ade9499bcbdc6abd0b299cc02a01995
SHA512fa1fd14dd50223c2b7c9d1e48968f0991fc25035ced629287e35ce9123d45285b0154c11bb17e079f74b92756d64467a2fb5002550294dc39ce65877d8dd63cd
-
Filesize
577KB
MD56f7a74a4a37fdd1828703d70ff2ee808
SHA1de13b8d649635b04e15520a935207b69a7f8f652
SHA256aa54e32bda477030edb9ff09131668c2be8b610f845720d75b3278feb0cf2ac3
SHA51201937e248ba445f8447730c7057b83cace767a5dd4f1e91be8adfef735b2630f67191092f5d6e6959700f1eb52bfd92abe225c2ce09dfa9323d87c7a796ef79c
-
Filesize
382KB
MD5049066f06e5f41ceeea64cd948f95bc4
SHA14d2d2d8bfa6134992c1f7217435445bc5af3f526
SHA2565e4beedbcaec2307b46433b6f29be36c650f4214b7078b3f0b55c1fa4a81635c
SHA51235dc2047d269b1eb7d91e1fdd39f11c8c520e88eadc24e2c0096effdb0b54ee66d89a626ac5f8c9da4bebab13be318bdca1883d01eaf4bd24a9c2d0a51d3be3b
-
Filesize
295KB
MD5e1fb9c32ee188e153ec4219285a696c2
SHA10f160b5ac9ffc7cd9079080f54601f70d05570de
SHA25632baaeeebd843aebcbe2fc4943bd1185149c1b59c7af315a57a8024dbdb31be5
SHA5124cdfb7dd31e765abff55bd2cc755c66e2ef99732c04141093269b3bc174a79bd47dbff541b1767a14c236c67c8c45a554acfa1df16cf1c5813d8de243eda82eb
-
Filesize
222KB
MD5c7747b2f03c656c810bb2860db64bc9b
SHA17ac109f6b54a916cc50b13f21dd25afdf96b4c6f
SHA2569d64dd96fec38e41895e114650bcb3eabc27b6e4298798139bb718e5f579675a
SHA512259805152ec02c071aa2da2cf3d512a19d3b58be221579dcac47dda7986e8b1ec7dbff704907309a99549e48466a6547af64ab9dfab771aa22a254621bbe1ab1