Overview
overview
10Static
static
30e266a7216...9f.exe
windows10-2004-x64
100fed7be9f1...18.exe
windows10-2004-x64
1016ac715816...ea.exe
windows10-2004-x64
1026c470a8b0...9a.exe
windows10-2004-x64
102d47818e79...79.exe
windows10-2004-x64
102e6c446801...a5.exe
windows7-x64
102e6c446801...a5.exe
windows10-2004-x64
102f02d9074f...e7.exe
windows10-2004-x64
104d1fc94da1...dc.exe
windows10-2004-x64
10521f6870a3...07.exe
windows10-2004-x64
105e01d698ad...d1.exe
windows10-2004-x64
107dc4ebbe25...36.exe
windows10-2004-x64
10862a8f43d1...32.exe
windows10-2004-x64
10ba494624ee...0c.exe
windows10-2004-x64
10ba4c5213c0...28.exe
windows10-2004-x64
10bbfb7f577d...dc.exe
windows10-2004-x64
10be3d316058...ca.exe
windows10-2004-x64
10e1d166047d...d0.exe
windows10-2004-x64
10e56b24cbcd...10.exe
windows10-2004-x64
10ef4487829b...03.exe
windows10-2004-x64
10fdbb9a49cd...e7.exe
windows10-2004-x64
10Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0e266a72166321124c500c505eac80a998786768d1c1e7be12c0c09adbdb969f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16ac715816f3482cfc24aaddcdcd5f3994bb21599090c021f66c1dce047523ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
26c470a8b0d923529cb630dee55e87b901f38e0ee675c3213b68e8b1db239e9a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
2f02d9074fc5208b7b3e27f59a5867d15d3e0fa8490020ad8680b051f00a27e7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4d1fc94da13e115d0cfb24b80df5875a92e199a440121a1fe8c37f1258ef23dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5e01d698adb505dae22bf133909e0103e980c2f29ad0c1eecdf47f2487dafed1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
862a8f43d1bd92e93fbfad58f9943a043f45ae975ab50181d393ffb2fa848532.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ba4c5213c01fa30e0752b610dd412c61729c7ecd046fa9a5bdde3b5bcccb9a28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
be3d3160582a8debaa43a4fd41c15c9912c7e9f9fd4b736991afb8ad220ebfca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e1d166047db27931c64d2750c2c0d4d27bb57655e624d6cd5eeed46b63a5cbd0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e56b24cbcd2f2dc78ead0bbfb6d673cbd44be4ae5db1dbbf9a1fdb709103d010.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ef4487829bbec1eb751da8fe7227f27dccd52cd7f16d1d5d8bdcd1af42b36903.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe
Resource
win10v2004-20240508-en
General
-
Target
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe
-
Size
1.1MB
-
MD5
d0d105a2196b197a7117daf301d63dc0
-
SHA1
a909a59c09dd6cf89b34745d28e049ae0f7539c6
-
SHA256
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7
-
SHA512
d8ca188bc8188244a5aa6a11b13e35bbb887f00ee79da4933bc13325fb044fa30d8f2ca23e6b99498511c12900553d86d453c2cdcac0d5f2a209199eb6a592fc
-
SSDEEP
24576:/yWI9E/hFi5iDdQgzLH+TV/60X2KyLPoGLrEhJcYQuUS:KWthFi5iDyTV/60X2FdfE7guU
Malware Config
Extracted
redline
plost
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral21/memory/4800-25-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral21/memory/4800-26-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral21/memory/4800-28-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral21/memory/2376-37-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 2836 ac9Eq08.exe 4988 Nk2Qz99.exe 2124 1KM16kE8.exe 2560 2pa4107.exe 3604 3cn85hT.exe 1584 4CZ548OE.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ac9Eq08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Nk2Qz99.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2124 set thread context of 1772 2124 1KM16kE8.exe 95 PID 2560 set thread context of 4800 2560 2pa4107.exe 97 PID 1584 set thread context of 2376 1584 4CZ548OE.exe 101 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cn85hT.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cn85hT.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cn85hT.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1772 AppLaunch.exe 1772 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1772 AppLaunch.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2836 4636 fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe 91 PID 4636 wrote to memory of 2836 4636 fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe 91 PID 4636 wrote to memory of 2836 4636 fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe 91 PID 2836 wrote to memory of 4988 2836 ac9Eq08.exe 92 PID 2836 wrote to memory of 4988 2836 ac9Eq08.exe 92 PID 2836 wrote to memory of 4988 2836 ac9Eq08.exe 92 PID 4988 wrote to memory of 2124 4988 Nk2Qz99.exe 93 PID 4988 wrote to memory of 2124 4988 Nk2Qz99.exe 93 PID 4988 wrote to memory of 2124 4988 Nk2Qz99.exe 93 PID 2124 wrote to memory of 1772 2124 1KM16kE8.exe 95 PID 2124 wrote to memory of 1772 2124 1KM16kE8.exe 95 PID 2124 wrote to memory of 1772 2124 1KM16kE8.exe 95 PID 2124 wrote to memory of 1772 2124 1KM16kE8.exe 95 PID 2124 wrote to memory of 1772 2124 1KM16kE8.exe 95 PID 2124 wrote to memory of 1772 2124 1KM16kE8.exe 95 PID 2124 wrote to memory of 1772 2124 1KM16kE8.exe 95 PID 2124 wrote to memory of 1772 2124 1KM16kE8.exe 95 PID 4988 wrote to memory of 2560 4988 Nk2Qz99.exe 96 PID 4988 wrote to memory of 2560 4988 Nk2Qz99.exe 96 PID 4988 wrote to memory of 2560 4988 Nk2Qz99.exe 96 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2560 wrote to memory of 4800 2560 2pa4107.exe 97 PID 2836 wrote to memory of 3604 2836 ac9Eq08.exe 98 PID 2836 wrote to memory of 3604 2836 ac9Eq08.exe 98 PID 2836 wrote to memory of 3604 2836 ac9Eq08.exe 98 PID 4636 wrote to memory of 1584 4636 fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe 99 PID 4636 wrote to memory of 1584 4636 fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe 99 PID 4636 wrote to memory of 1584 4636 fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe 99 PID 1584 wrote to memory of 2376 1584 4CZ548OE.exe 101 PID 1584 wrote to memory of 2376 1584 4CZ548OE.exe 101 PID 1584 wrote to memory of 2376 1584 4CZ548OE.exe 101 PID 1584 wrote to memory of 2376 1584 4CZ548OE.exe 101 PID 1584 wrote to memory of 2376 1584 4CZ548OE.exe 101 PID 1584 wrote to memory of 2376 1584 4CZ548OE.exe 101 PID 1584 wrote to memory of 2376 1584 4CZ548OE.exe 101 PID 1584 wrote to memory of 2376 1584 4CZ548OE.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe"C:\Users\Admin\AppData\Local\Temp\fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ac9Eq08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ac9Eq08.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nk2Qz99.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nk2Qz99.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1KM16kE8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1KM16kE8.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2pa4107.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2pa4107.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3cn85hT.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3cn85hT.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4CZ548OE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4CZ548OE.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2376
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4084,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=4008 /prefetch:81⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5255441ee48916fb136815f7bec0e1fdd
SHA1709cb425c46f45c11c0da8777fdbc17ec321c545
SHA2568f8d8ea94c5904ce6c401f2c20a0b75bf027375d4210266c75559b764408b7df
SHA5120e90708c47e1d9c30b4ccd26ff53ecbf0718a6a17db980413eb9e3e8d469b4dd376d5c32222d40a545760f696fff00997c34c735823f269487e2af7f2b1e6f6a
-
Filesize
655KB
MD5d34412dc76febfa78ffb20eff31320bb
SHA1a4a4f435f74a0d1e78e06617b2217791acf3d4e6
SHA256ece68a1a24d3957a3d082f98d11d6445f9a64dbe4600e64e4d7e75f9987938a5
SHA51260f323569dece1171af98ad8e6e3d535d2297c65366487194651ae760a31e8bc3871cda3135d03c68b2427949c5f9bf8349600833861c29580ec4ff535fb0969
-
Filesize
31KB
MD5314fa0836479755b541b458a7c348818
SHA1e19844a55994fe5b8b89eb9615b1b97f92836025
SHA256b4514de3acdd6e051b3bb0aa10353c14310c726bb338a007ab9d46b3843341a7
SHA512eb8d39b7cfe1b1a847549518b14b4ea85b98ec40bdfce423239560e48aee4cd6ea7f393ee81c916ab7aaa19024dfb33211c1991759a1a54f9a89afca0e98afd9
-
Filesize
531KB
MD5bc0e05647c5c5bd6a1a32e7aa0912c41
SHA17777647195d23f4ed750cfefb039d3bbda8b3e21
SHA256f38e5c90e98ed0f6de4b1e4391cddce2f65fccb3b907affcd4bc1722ce4ac91c
SHA512ab09c7bb30727101ce3ec20c335790c85d45749defbb61fc6068beedeb66f5098b3eb9080566538fa0a1544646ff0291a4b02d16a4390906878fbce599597cd6
-
Filesize
920KB
MD5e2b545422d316655e1250858c36bce15
SHA1f1df0f6935aeb8620d48c2420ea039e3d666e089
SHA256bfe3f603c9d75955795cc0b108e2f66ea3732a19a852f128748681df5e0fee29
SHA512ca889af21c3b809a0312d360048ca7f8034c2cae7a88c30c37988c04e722cb70a185c88c9dafab97a4ccb1a8c7b72a9204bbb9354f16e6bd21fb6fac59e45d14
-
Filesize
1.1MB
MD5159be5e709827faa7b7330c0a9715ba7
SHA1bcf867153bb5c7fb5b496fef84a03e2332dffb6b
SHA256a84306c3f03020389a40bfb036dbd4d0e99314e53f506d1752c469b3f782dcda
SHA512910e287f272e4cbbebf8be3d6b51503e909c61bbfb5c9611f7ae0d2e69561198780a3581302fa3e1b3670a3a0857e1a5734ceb498e6c0c5ed2444ea3e7a79245