Overview
overview
10Static
static
30e266a7216...9f.exe
windows10-2004-x64
100fed7be9f1...18.exe
windows10-2004-x64
1016ac715816...ea.exe
windows10-2004-x64
1026c470a8b0...9a.exe
windows10-2004-x64
102d47818e79...79.exe
windows10-2004-x64
102e6c446801...a5.exe
windows7-x64
102e6c446801...a5.exe
windows10-2004-x64
102f02d9074f...e7.exe
windows10-2004-x64
104d1fc94da1...dc.exe
windows10-2004-x64
10521f6870a3...07.exe
windows10-2004-x64
105e01d698ad...d1.exe
windows10-2004-x64
107dc4ebbe25...36.exe
windows10-2004-x64
10862a8f43d1...32.exe
windows10-2004-x64
10ba494624ee...0c.exe
windows10-2004-x64
10ba4c5213c0...28.exe
windows10-2004-x64
10bbfb7f577d...dc.exe
windows10-2004-x64
10be3d316058...ca.exe
windows10-2004-x64
10e1d166047d...d0.exe
windows10-2004-x64
10e56b24cbcd...10.exe
windows10-2004-x64
10ef4487829b...03.exe
windows10-2004-x64
10fdbb9a49cd...e7.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0e266a72166321124c500c505eac80a998786768d1c1e7be12c0c09adbdb969f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16ac715816f3482cfc24aaddcdcd5f3994bb21599090c021f66c1dce047523ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
26c470a8b0d923529cb630dee55e87b901f38e0ee675c3213b68e8b1db239e9a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
2f02d9074fc5208b7b3e27f59a5867d15d3e0fa8490020ad8680b051f00a27e7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4d1fc94da13e115d0cfb24b80df5875a92e199a440121a1fe8c37f1258ef23dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5e01d698adb505dae22bf133909e0103e980c2f29ad0c1eecdf47f2487dafed1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
862a8f43d1bd92e93fbfad58f9943a043f45ae975ab50181d393ffb2fa848532.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ba4c5213c01fa30e0752b610dd412c61729c7ecd046fa9a5bdde3b5bcccb9a28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
be3d3160582a8debaa43a4fd41c15c9912c7e9f9fd4b736991afb8ad220ebfca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e1d166047db27931c64d2750c2c0d4d27bb57655e624d6cd5eeed46b63a5cbd0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e56b24cbcd2f2dc78ead0bbfb6d673cbd44be4ae5db1dbbf9a1fdb709103d010.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ef4487829bbec1eb751da8fe7227f27dccd52cd7f16d1d5d8bdcd1af42b36903.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe
Resource
win10v2004-20240508-en
General
-
Target
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe
-
Size
1.3MB
-
MD5
11728981fb1adc2e63a6b2d6fcde146e
-
SHA1
fa4e657cc1864bc8b3ce2becd08754443c554ce3
-
SHA256
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279
-
SHA512
a4773eac380244c47c6bbd70fd55b93ae3c84d1c9ae72d7872ed33bee50fa60d6fb57588a8a2e91a4ebe7dee61e6df9370eb884a08f2922cf35b3f47cc6fe04b
-
SSDEEP
24576:gyoY+pehFeujvFIrFR2g9sJIHynJ6UwcOJHdaK5jBpqY:noY8eBOrFR2R2HyJ6RcOZdaK5
Malware Config
Extracted
redline
magia
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2hV1305.exe mystic_family -
Processes:
1by86Ir5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1by86Ir5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1by86Ir5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1by86Ir5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1by86Ir5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1by86Ir5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1by86Ir5.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral5/memory/3696-63-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
Processes:
aN8cu72.exejM2MJ15.exe1by86Ir5.exe2hV1305.exe3dS49FM.exe4pK492br.exepid process 4892 aN8cu72.exe 3168 jM2MJ15.exe 4084 1by86Ir5.exe 3564 2hV1305.exe 1900 3dS49FM.exe 832 4pK492br.exe -
Processes:
1by86Ir5.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1by86Ir5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1by86Ir5.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exeaN8cu72.exejM2MJ15.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" aN8cu72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" jM2MJ15.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3dS49FM.exe4pK492br.exedescription pid process target process PID 1900 set thread context of 1204 1900 3dS49FM.exe AppLaunch.exe PID 832 set thread context of 3696 832 4pK492br.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3576 1900 WerFault.exe 3dS49FM.exe 4652 832 WerFault.exe 4pK492br.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1by86Ir5.exepid process 4084 1by86Ir5.exe 4084 1by86Ir5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1by86Ir5.exedescription pid process Token: SeDebugPrivilege 4084 1by86Ir5.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exeaN8cu72.exejM2MJ15.exe3dS49FM.exe4pK492br.exedescription pid process target process PID 4296 wrote to memory of 4892 4296 2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe aN8cu72.exe PID 4296 wrote to memory of 4892 4296 2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe aN8cu72.exe PID 4296 wrote to memory of 4892 4296 2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe aN8cu72.exe PID 4892 wrote to memory of 3168 4892 aN8cu72.exe jM2MJ15.exe PID 4892 wrote to memory of 3168 4892 aN8cu72.exe jM2MJ15.exe PID 4892 wrote to memory of 3168 4892 aN8cu72.exe jM2MJ15.exe PID 3168 wrote to memory of 4084 3168 jM2MJ15.exe 1by86Ir5.exe PID 3168 wrote to memory of 4084 3168 jM2MJ15.exe 1by86Ir5.exe PID 3168 wrote to memory of 4084 3168 jM2MJ15.exe 1by86Ir5.exe PID 3168 wrote to memory of 3564 3168 jM2MJ15.exe 2hV1305.exe PID 3168 wrote to memory of 3564 3168 jM2MJ15.exe 2hV1305.exe PID 3168 wrote to memory of 3564 3168 jM2MJ15.exe 2hV1305.exe PID 4892 wrote to memory of 1900 4892 aN8cu72.exe 3dS49FM.exe PID 4892 wrote to memory of 1900 4892 aN8cu72.exe 3dS49FM.exe PID 4892 wrote to memory of 1900 4892 aN8cu72.exe 3dS49FM.exe PID 1900 wrote to memory of 1204 1900 3dS49FM.exe AppLaunch.exe PID 1900 wrote to memory of 1204 1900 3dS49FM.exe AppLaunch.exe PID 1900 wrote to memory of 1204 1900 3dS49FM.exe AppLaunch.exe PID 1900 wrote to memory of 1204 1900 3dS49FM.exe AppLaunch.exe PID 1900 wrote to memory of 1204 1900 3dS49FM.exe AppLaunch.exe PID 1900 wrote to memory of 1204 1900 3dS49FM.exe AppLaunch.exe PID 4296 wrote to memory of 832 4296 2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe 4pK492br.exe PID 4296 wrote to memory of 832 4296 2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe 4pK492br.exe PID 4296 wrote to memory of 832 4296 2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe 4pK492br.exe PID 832 wrote to memory of 3696 832 4pK492br.exe AppLaunch.exe PID 832 wrote to memory of 3696 832 4pK492br.exe AppLaunch.exe PID 832 wrote to memory of 3696 832 4pK492br.exe AppLaunch.exe PID 832 wrote to memory of 3696 832 4pK492br.exe AppLaunch.exe PID 832 wrote to memory of 3696 832 4pK492br.exe AppLaunch.exe PID 832 wrote to memory of 3696 832 4pK492br.exe AppLaunch.exe PID 832 wrote to memory of 3696 832 4pK492br.exe AppLaunch.exe PID 832 wrote to memory of 3696 832 4pK492br.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe"C:\Users\Admin\AppData\Local\Temp\2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aN8cu72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aN8cu72.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2MJ15.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2MJ15.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1by86Ir5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1by86Ir5.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2hV1305.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2hV1305.exe4⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3dS49FM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3dS49FM.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:1204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 6164⤵
- Program crash
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4pK492br.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4pK492br.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 5963⤵
- Program crash
PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1900 -ip 19001⤵PID:312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 832 -ip 8321⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5fb617d002d8e639ce3b846a599ff11d9
SHA1d2cedf0c68096175c558b167bdf8ae36cd35b745
SHA2566a707af2d1e3fadc607d5feeb1c107d0b0de255f3e5773a2713f9dea6e7b6dff
SHA51283f9f3e4e0331a98568999463e697d7a7f0f2b3aa8054f2190b04d6c5699e04443e7db7af31342e5b9730d610997f153206342349433000b520f638ba9e5f5e1
-
Filesize
840KB
MD597fab7e69268dafac9d44f2d90bbedea
SHA19c75e418e7e528d49089f0e37391e3de12c21679
SHA2560f6232cef5511fdc3b92fb32ceef7c112c8a7f45ac431123971b5953c4796829
SHA5128c0c1de29ebd6f819616068c4c7f16d45ad14dd195836723fb8cfd8cebd726d48e1fb5dc62fbc695a79f0f05d9c73b7aca38abd01ecde23b160fb23c1a437ab7
-
Filesize
1.6MB
MD54024e24f433e1864343b04f2dc769a1b
SHA108f9ed5f8d347f7cc3e9fa7b9bd444bba7450cc8
SHA25607a08ecb2baa3b75ed7ad4770c2c70ecd32a777ae5ba0b915edb4c1dfff4a5d5
SHA512fc88d5701f44d1108136e2b26ac0b9ca24f15ca207ffce809fe6f0d139a206c9899a55674344a7283d0ffff1d42a08884ab5d7609b852ae958334b14e7abea26
-
Filesize
362KB
MD56d6d9ccc69c3975792e297253b04f5ab
SHA1c56afe9a5b08bf9ce492d9d54390f7c28da76f60
SHA2561de7b097aa63309ab3baca6076374e0121e3bb250e01e51118b32cc0647e428b
SHA5129ccd2e40f02e6d8bbff419a561516e2c9cf3c67a7031a9949ec59eb49dda89319428ca4d4e77b199837f3082cbc3d49dd468ba65100841a2269b5fdfaf59121a
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84