Overview
overview
10Static
static
30697314d1d...a5.exe
windows10-2004-x64
100f998493b8...79.exe
windows10-2004-x64
1021e1937094...38.exe
windows10-2004-x64
102800d64eb3...31.exe
windows10-2004-x64
10299e46ee08...d5.exe
windows10-2004-x64
103d64fae31a...d7.exe
windows10-2004-x64
10652a4e2d36...35.exe
windows10-2004-x64
106b4d258a8d...1a.exe
windows10-2004-x64
1074c99e0dfd...42.exe
windows10-2004-x64
107e6bab9491...d0.exe
windows10-2004-x64
1080af2b3540...7e.exe
windows10-2004-x64
10a96b277202...ca.exe
windows10-2004-x64
10b618a9cedf...7f.exe
windows10-2004-x64
10c1237a6a46...5b.exe
windows10-2004-x64
10d7fde0f5ef...97.exe
windows10-2004-x64
10da85318c86...60.exe
windows10-2004-x64
10dc220ed080...4e.exe
windows10-2004-x64
10e5e7bb0a7c...4a.exe
windows10-2004-x64
10e91c8d8104...e0.exe
windows10-2004-x64
10f3b6442113...3b.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
0697314d1d15813c538133353196a25ddf09e9340585e2de0be061757a02bea5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f998493b83f94488301c2a7f85ec4ad445820110ece601aee7e9d15a5ae5179.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
21e19370941ed45f65950d345652c8fe76f4f409b0bbb8261c579fb219042338.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2800d64eb3bc5b7c1f807e9baaf76c469f1d63f07cc116fb310c5c866087d931.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
299e46ee08841fc6eb4d1c18d756d39f82a681622c3d6cb0e68ec7f71013a4d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
3d64fae31acb5d4e6e0319606608e94d2b3a017279c295dba43ce4d28aab53d7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
652a4e2d36de8360e61d407c228b3eb8948cafa60881c208bbd568afd7222f35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
74c99e0dfdc0750268c34c3d63288e0bea52796a82c9b157a495fbe2608d4942.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
80af2b3540716fa5dcd664b7f7ed120e1c1aa575c2fc1e1b6ee5df1723f2ab7e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b618a9cedf57a29c508359374db294c624b68a83d6b7b01f154cd25515b3777f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
c1237a6a46458518390f044aae909d7b4e395ae64c6bb1db16e0cbe581f8d65b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d7fde0f5efb7f555528ff1c98946e36088ec7396d07c4fd0a577c6b49c4bcd97.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dc220ed080f58ca4a078f8ea2a3ba2d42611f3da8514d41359c39eae805b1c4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe
Resource
win10v2004-20240426-en
General
-
Target
7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe
-
Size
1.2MB
-
MD5
2184c0b0f1719f6e847905d1b8c16d75
-
SHA1
a346ddfc7dfac42ef45b856957a49da604d4788a
-
SHA256
7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0
-
SHA512
515fe6cbaf9cc7ecef386b1c9fe455d5e177a6d5b10e6ad4c0454b2958faba3ddacd21d1ddbbbc747608dd0b6468dee306aa0c63862d36e1d56accc2c4123423
-
SSDEEP
24576:oyH9alXqINC8tf/DnEFvrg5mzfPy4GS+xUywf2WMn0IAClu:vH9al6I48tf/z2v0gzfPybOyiRal
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral10/memory/4444-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral10/memory/4444-27-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral10/memory/4444-25-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral10/memory/4444-24-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x000700000002344d-28.dat family_redline behavioral10/memory/4764-29-0x00000000004D0000-0x000000000050E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3396 xY1ol9cz.exe 3456 Lv0ai3dz.exe 4720 1pm49Un8.exe 4764 2hp794uB.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" xY1ol9cz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Lv0ai3dz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4720 set thread context of 4444 4720 1pm49Un8.exe 95 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4452 wrote to memory of 3396 4452 7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe 82 PID 4452 wrote to memory of 3396 4452 7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe 82 PID 4452 wrote to memory of 3396 4452 7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe 82 PID 3396 wrote to memory of 3456 3396 xY1ol9cz.exe 83 PID 3396 wrote to memory of 3456 3396 xY1ol9cz.exe 83 PID 3396 wrote to memory of 3456 3396 xY1ol9cz.exe 83 PID 3456 wrote to memory of 4720 3456 Lv0ai3dz.exe 85 PID 3456 wrote to memory of 4720 3456 Lv0ai3dz.exe 85 PID 3456 wrote to memory of 4720 3456 Lv0ai3dz.exe 85 PID 4720 wrote to memory of 2060 4720 1pm49Un8.exe 94 PID 4720 wrote to memory of 2060 4720 1pm49Un8.exe 94 PID 4720 wrote to memory of 2060 4720 1pm49Un8.exe 94 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 4720 wrote to memory of 4444 4720 1pm49Un8.exe 95 PID 3456 wrote to memory of 4764 3456 Lv0ai3dz.exe 96 PID 3456 wrote to memory of 4764 3456 Lv0ai3dz.exe 96 PID 3456 wrote to memory of 4764 3456 Lv0ai3dz.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe"C:\Users\Admin\AppData\Local\Temp\7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xY1ol9cz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xY1ol9cz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Lv0ai3dz.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Lv0ai3dz.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1pm49Un8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1pm49Un8.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2060
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2hp794uB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2hp794uB.exe4⤵
- Executes dropped EXE
PID:4764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782KB
MD540b509736f2336f0ae4798e08093be25
SHA1aef0b5561edf2078238e0550b1468910c0730d2b
SHA2565570e3901d5acc58fb38547e39a9784bf614606e68618789df0d7e29da683d81
SHA5121e42ec6f3e618a4259c5c4b809f3109ff8807e5d83b7f37f541b3eba599f3fe153ea43002eabdfcc2bd4e5e21fc3ece00f95f35ae8c9c4cc09a61e0c07dad22d
-
Filesize
581KB
MD547faacabe3e611fee8ca21df0ee60a3a
SHA1d7ce2a93a642faa7760fa90088472e04dadaa38c
SHA256bfed9559148c0f2b326d1f171a302f4bde8440ff3a1a4fc1bcba1a3f69a0a5cf
SHA5125f0429f0da1a4a9ab3d4ea585eaa22666d545d943875e4a7b70b70cfedc4678fed99e9f9296f4d320ca1ad657d5d2da9c8576e177fd7d02e4aa286d98d00fcca
-
Filesize
1.1MB
MD56ef68ec5b2d91cbc9c66fa0553e527ec
SHA18d8ab02a5f2433cf12ba62336e4d774f2bbf21d2
SHA2568ffa8c6bcf0b38b229ac57e8a8eacfad2d27bd2b6ec971af827609bfb919495f
SHA5121a02ccdf3d1be279169bc25eb2a4452be337389b78050811ea4367ca624d5d169c7c7e157a73fe3be13378412e8d94606f41c157b5892cc76c4344ee85d204a6
-
Filesize
222KB
MD5d049270ff6e8fdefaafc53820f3ea25a
SHA1606c65b1c7a3c2400e14f4e97bac91027ce600ea
SHA256e0914346800baf7dd7a64af17a4cca8def0eb6c5df5da8376299c5ee9a901e6e
SHA51274d08cc70eb0094dca50553f825fb4f240bbbd9a0e274accde47a0c46c3463ac33575c204757183dbaa09afc8fb2e1bbd6aa8464a3539758982eb9a1ce38d347