Overview
overview
10Static
static
30e266a7216...9f.exe
windows10-2004-x64
100fed7be9f1...18.exe
windows10-2004-x64
1016ac715816...ea.exe
windows10-2004-x64
1026c470a8b0...9a.exe
windows10-2004-x64
102d47818e79...79.exe
windows10-2004-x64
102e6c446801...a5.exe
windows7-x64
102e6c446801...a5.exe
windows10-2004-x64
102f02d9074f...e7.exe
windows10-2004-x64
104d1fc94da1...dc.exe
windows10-2004-x64
10521f6870a3...07.exe
windows10-2004-x64
105e01d698ad...d1.exe
windows10-2004-x64
107dc4ebbe25...36.exe
windows10-2004-x64
10862a8f43d1...32.exe
windows10-2004-x64
10ba494624ee...0c.exe
windows10-2004-x64
10ba4c5213c0...28.exe
windows10-2004-x64
10bbfb7f577d...dc.exe
windows10-2004-x64
10be3d316058...ca.exe
windows10-2004-x64
10e1d166047d...d0.exe
windows10-2004-x64
10e56b24cbcd...10.exe
windows10-2004-x64
10ef4487829b...03.exe
windows10-2004-x64
10fdbb9a49cd...e7.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0e266a72166321124c500c505eac80a998786768d1c1e7be12c0c09adbdb969f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16ac715816f3482cfc24aaddcdcd5f3994bb21599090c021f66c1dce047523ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
26c470a8b0d923529cb630dee55e87b901f38e0ee675c3213b68e8b1db239e9a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
2f02d9074fc5208b7b3e27f59a5867d15d3e0fa8490020ad8680b051f00a27e7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4d1fc94da13e115d0cfb24b80df5875a92e199a440121a1fe8c37f1258ef23dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5e01d698adb505dae22bf133909e0103e980c2f29ad0c1eecdf47f2487dafed1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
862a8f43d1bd92e93fbfad58f9943a043f45ae975ab50181d393ffb2fa848532.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ba4c5213c01fa30e0752b610dd412c61729c7ecd046fa9a5bdde3b5bcccb9a28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
be3d3160582a8debaa43a4fd41c15c9912c7e9f9fd4b736991afb8ad220ebfca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e1d166047db27931c64d2750c2c0d4d27bb57655e624d6cd5eeed46b63a5cbd0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e56b24cbcd2f2dc78ead0bbfb6d673cbd44be4ae5db1dbbf9a1fdb709103d010.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ef4487829bbec1eb751da8fe7227f27dccd52cd7f16d1d5d8bdcd1af42b36903.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe
Resource
win10v2004-20240508-en
General
-
Target
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe
-
Size
1005KB
-
MD5
887963b609c75fab94a3090c952dce34
-
SHA1
4c985683f9c4e0d903330d944df6e71e5c378345
-
SHA256
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc
-
SHA512
15f4fea1aaaeda4dbaa2e2a2a643d44b02264a1e7a45cae05ca0ecc947d9965398d82955b49f52703fbb58d9fec7beb50c2e1337c19239b26cd7e047ba0f0bfe
-
SSDEEP
24576:ZyExiSehVkMuwYVH9DuD9lT3/8AO7klDe:MExiSe//uw49DuT3/8AD
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral16/memory/2712-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral16/memory/2712-31-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral16/memory/2712-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2VT835xH.exe family_redline behavioral16/memory/4288-35-0x0000000000560000-0x000000000059E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
fY5kt7iT.exeSk4Lv9ZT.exedW3jG3ML.exe1gJ52jb8.exe2VT835xH.exepid process 380 fY5kt7iT.exe 1052 Sk4Lv9ZT.exe 1632 dW3jG3ML.exe 952 1gJ52jb8.exe 4288 2VT835xH.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exefY5kt7iT.exeSk4Lv9ZT.exedW3jG3ML.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fY5kt7iT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Sk4Lv9ZT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" dW3jG3ML.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1gJ52jb8.exedescription pid process target process PID 952 set thread context of 2712 952 1gJ52jb8.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1560 952 WerFault.exe 1gJ52jb8.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exefY5kt7iT.exeSk4Lv9ZT.exedW3jG3ML.exe1gJ52jb8.exedescription pid process target process PID 4352 wrote to memory of 380 4352 bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe fY5kt7iT.exe PID 4352 wrote to memory of 380 4352 bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe fY5kt7iT.exe PID 4352 wrote to memory of 380 4352 bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe fY5kt7iT.exe PID 380 wrote to memory of 1052 380 fY5kt7iT.exe Sk4Lv9ZT.exe PID 380 wrote to memory of 1052 380 fY5kt7iT.exe Sk4Lv9ZT.exe PID 380 wrote to memory of 1052 380 fY5kt7iT.exe Sk4Lv9ZT.exe PID 1052 wrote to memory of 1632 1052 Sk4Lv9ZT.exe dW3jG3ML.exe PID 1052 wrote to memory of 1632 1052 Sk4Lv9ZT.exe dW3jG3ML.exe PID 1052 wrote to memory of 1632 1052 Sk4Lv9ZT.exe dW3jG3ML.exe PID 1632 wrote to memory of 952 1632 dW3jG3ML.exe 1gJ52jb8.exe PID 1632 wrote to memory of 952 1632 dW3jG3ML.exe 1gJ52jb8.exe PID 1632 wrote to memory of 952 1632 dW3jG3ML.exe 1gJ52jb8.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 952 wrote to memory of 2712 952 1gJ52jb8.exe AppLaunch.exe PID 1632 wrote to memory of 4288 1632 dW3jG3ML.exe 2VT835xH.exe PID 1632 wrote to memory of 4288 1632 dW3jG3ML.exe 2VT835xH.exe PID 1632 wrote to memory of 4288 1632 dW3jG3ML.exe 2VT835xH.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe"C:\Users\Admin\AppData\Local\Temp\bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fY5kt7iT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fY5kt7iT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sk4Lv9ZT.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sk4Lv9ZT.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dW3jG3ML.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dW3jG3ML.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1gJ52jb8.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1gJ52jb8.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 5846⤵
- Program crash
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2VT835xH.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2VT835xH.exe5⤵
- Executes dropped EXE
PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 952 -ip 9521⤵PID:840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD514e04c8f8a4e0a272f1367ea38cc9168
SHA1412ba08423c17314a12dd845d9dc82e4d0d3125c
SHA2561f55f132584e385349eeb62933f500fc78a415f1074778dfe2a11b6d30e5b03b
SHA512af097a7aa6953a6dc842a39534426e4eb69b4c3e2e13bb300bd9a08ecd3ebf697344a27b08b8f46d599725017efe3511afdca511b6abd41b1c696ade8b19908c
-
Filesize
583KB
MD56dc75a240b0a1726a2b19c8db68315e5
SHA14c59b7d6eb26ba8a0136ab06431755bd74e3a7cd
SHA2560139c114891e09fc31afa4b386445c7c9c1158c88d228899285b7d9e8f65b558
SHA51296dcc37f184dea339da5b864da59da2df520d43fa10840a645d160822b149a74249d2ad305704748a8662dc18529c149e69518eba937caaf29270a4fcaa0c8e8
-
Filesize
381KB
MD54ed908bf061305cdfa1bd61bf00631d7
SHA1b86fc5affd86a3c9981721ac66297c464cecccaf
SHA256a79b45a7ed9162883dd546bd173daaac10484c91ef9735a86d1ac03fed724aaf
SHA512b5922f4496418ee459a37ecfa5bfca2486e83b95e071e592cec39929d27063f6963a0e48f8b0da90ee4ef6bc213a2084fb938b9e12e11552026b6ad2f288b728
-
Filesize
295KB
MD5c52ab0e3e6d74d251f86f11517e49b0d
SHA136bb9d1326e883e9ce7ddc62560246500ecf95d8
SHA256ed9f3989866969b858a9f5b5ac6bcdfa2d54c21dda48446516a97d44d2b0adac
SHA51284b25791aa36ffe78b39aa02f99dd69bb25a6381b42482cef407b69e2102ce5e102afedb43b4a96960fbe47857b7c9c1cccf4013011b8cc55ea262cc6098079c
-
Filesize
222KB
MD5cc804a898eef4fc35bd66f7275c629cd
SHA16398a6e8dbd017caa11a708aa77534e8894502b9
SHA256ca2217c18d5a33b3b8ac0d088360bfbff72a00dd866860e35b4dfd40ff394b17
SHA5124542a1a95cc17267a09a53ffb5fa86fc32a207266278cb4c63ac12a69308d55eb7a9335633884ac4b1ba4f83c8167719332fbb87ae631c6be7b6de62c1b68015