Overview
overview
10Static
static
30e266a7216...9f.exe
windows10-2004-x64
100fed7be9f1...18.exe
windows10-2004-x64
1016ac715816...ea.exe
windows10-2004-x64
1026c470a8b0...9a.exe
windows10-2004-x64
102d47818e79...79.exe
windows10-2004-x64
102e6c446801...a5.exe
windows7-x64
102e6c446801...a5.exe
windows10-2004-x64
102f02d9074f...e7.exe
windows10-2004-x64
104d1fc94da1...dc.exe
windows10-2004-x64
10521f6870a3...07.exe
windows10-2004-x64
105e01d698ad...d1.exe
windows10-2004-x64
107dc4ebbe25...36.exe
windows10-2004-x64
10862a8f43d1...32.exe
windows10-2004-x64
10ba494624ee...0c.exe
windows10-2004-x64
10ba4c5213c0...28.exe
windows10-2004-x64
10bbfb7f577d...dc.exe
windows10-2004-x64
10be3d316058...ca.exe
windows10-2004-x64
10e1d166047d...d0.exe
windows10-2004-x64
10e56b24cbcd...10.exe
windows10-2004-x64
10ef4487829b...03.exe
windows10-2004-x64
10fdbb9a49cd...e7.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0e266a72166321124c500c505eac80a998786768d1c1e7be12c0c09adbdb969f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16ac715816f3482cfc24aaddcdcd5f3994bb21599090c021f66c1dce047523ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
26c470a8b0d923529cb630dee55e87b901f38e0ee675c3213b68e8b1db239e9a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
2f02d9074fc5208b7b3e27f59a5867d15d3e0fa8490020ad8680b051f00a27e7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4d1fc94da13e115d0cfb24b80df5875a92e199a440121a1fe8c37f1258ef23dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5e01d698adb505dae22bf133909e0103e980c2f29ad0c1eecdf47f2487dafed1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
862a8f43d1bd92e93fbfad58f9943a043f45ae975ab50181d393ffb2fa848532.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ba4c5213c01fa30e0752b610dd412c61729c7ecd046fa9a5bdde3b5bcccb9a28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
be3d3160582a8debaa43a4fd41c15c9912c7e9f9fd4b736991afb8ad220ebfca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e1d166047db27931c64d2750c2c0d4d27bb57655e624d6cd5eeed46b63a5cbd0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e56b24cbcd2f2dc78ead0bbfb6d673cbd44be4ae5db1dbbf9a1fdb709103d010.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ef4487829bbec1eb751da8fe7227f27dccd52cd7f16d1d5d8bdcd1af42b36903.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe
Resource
win10v2004-20240508-en
General
-
Target
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe
-
Size
929KB
-
MD5
0c034ec9bd1d1265492a265494e3c888
-
SHA1
8beb9a78b3b865194fdab4e2d9b4d6db8614f666
-
SHA256
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c
-
SHA512
289a673f598b3f80b80c703513f9fa70169e4660aeb30cd962f5a7573c438b642549313114aba381e3e8fe5ad3a58dac3dcc1446e78d4fe2ae55216c7b8434a9
-
SSDEEP
24576:SymM9fMKeuKjgYQ2bkgXKtf/Gu/H17D1S7:5t9UKeHcYQ2bk0KEQH17D1S
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral14/memory/2408-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral14/memory/2408-30-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral14/memory/2408-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7071108.exe family_redline behavioral14/memory/2640-35-0x0000000000180000-0x00000000001B0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
x3338334.exex7229528.exex5451534.exeg6077926.exeh7071108.exepid process 2996 x3338334.exe 4704 x7229528.exe 1060 x5451534.exe 3644 g6077926.exe 2640 h7071108.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exex3338334.exex7229528.exex5451534.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3338334.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7229528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5451534.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g6077926.exedescription pid process target process PID 3644 set thread context of 2408 3644 g6077926.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3160 3644 WerFault.exe g6077926.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exex3338334.exex7229528.exex5451534.exeg6077926.exedescription pid process target process PID 2708 wrote to memory of 2996 2708 ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe x3338334.exe PID 2708 wrote to memory of 2996 2708 ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe x3338334.exe PID 2708 wrote to memory of 2996 2708 ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe x3338334.exe PID 2996 wrote to memory of 4704 2996 x3338334.exe x7229528.exe PID 2996 wrote to memory of 4704 2996 x3338334.exe x7229528.exe PID 2996 wrote to memory of 4704 2996 x3338334.exe x7229528.exe PID 4704 wrote to memory of 1060 4704 x7229528.exe x5451534.exe PID 4704 wrote to memory of 1060 4704 x7229528.exe x5451534.exe PID 4704 wrote to memory of 1060 4704 x7229528.exe x5451534.exe PID 1060 wrote to memory of 3644 1060 x5451534.exe g6077926.exe PID 1060 wrote to memory of 3644 1060 x5451534.exe g6077926.exe PID 1060 wrote to memory of 3644 1060 x5451534.exe g6077926.exe PID 3644 wrote to memory of 3472 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 3472 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 3472 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 3644 wrote to memory of 2408 3644 g6077926.exe AppLaunch.exe PID 1060 wrote to memory of 2640 1060 x5451534.exe h7071108.exe PID 1060 wrote to memory of 2640 1060 x5451534.exe h7071108.exe PID 1060 wrote to memory of 2640 1060 x5451534.exe h7071108.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe"C:\Users\Admin\AppData\Local\Temp\ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3338334.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3338334.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7229528.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7229528.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5451534.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5451534.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6077926.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6077926.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3472
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 5806⤵
- Program crash
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7071108.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7071108.exe5⤵
- Executes dropped EXE
PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3644 -ip 36441⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5d6d173ad0d8374701fe49464c3e26273
SHA175add4edb0e710d86173e2d72de847a41fdcb1f4
SHA256190f8da208468213e0025531229c21b94a028aad21c0100258c54a1396405dd3
SHA512bae71985a773e93a42f33668249e4a316fec0daad9eea982b930bb5e9e5952e8bd466f0d531c597ea88209870f93ebcea13b1c8d93909cae13952c0c32dea39b
-
Filesize
556KB
MD5cb10eb8ad36c71404478fa72c9246bda
SHA11dacb993abfbcf6dc0250e1f012aef78f5582d3b
SHA256adc4d98eda93b5b2180c15b5ef56188626ae8776275ce29cbca259ad11fc314b
SHA512a073080a0bb7eff80e950747a0c4e3cdf0d06d6c4022e9caebeb1f7056f9fc9f5a02cd54a713409b8bc9619eabd1a9fc9559ca30218528292a5b473ad0e7a920
-
Filesize
390KB
MD54d128fe4546ce3ebd90a496e1915e1ee
SHA175f395899c54e8e00950711790ca9a29dfaabae8
SHA256f37af0a7ec52f2bc564e2dc79390c3db7bc371888a0b501614c6270195488365
SHA5129666c9590f3c859ed045d81630004cf7886db6607038b3a7af66e52c449c1976d97a884b21fa92effaede3451e32342047925330c06986e7d975d1e51e1b8ccf
-
Filesize
356KB
MD5e38f41447352ad628eab47dd37d06648
SHA1e64f1c8171fe495ce46047810dd26482eb2e01ae
SHA256aabc8909e1bfdc0a593e17439aa430bf16f1db1c5ea95f7238e1faa6b2ea7f96
SHA5122c3faf280ea224ca930012b3c1b9569e1b76c32cc9c25dcfd8af36d426e68ff89f489dcd427f03b4ffcf29ffdf051bf0e78eb78b3099e8c9985be0ee3d5974e0
-
Filesize
174KB
MD5d711ad10c83928e03adc95ae3c13bec9
SHA138fc7266ed70dfb2d9aca063781b0a48ba805ebd
SHA2567d98f18ea849fdc8ac6d6edc5e0f50e0e55a76f54f20651e30df386878bbc673
SHA512c3d87fd33f0082ce3620f4f1cf43518fcc5a94a5a541a30d75226ce8a4971f531f937d534e3c26605638060c0bfe8bc61339a338ed44d2aaeb2e7127d11a24de