Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
-
Size
1.5MB
-
MD5
1d7874fa02f9084e0b62af612261bdd2
-
SHA1
b1d81b9a48264bc5771e37de7c7103256e6683b9
-
SHA256
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e
-
SHA512
a9b95375adf0020c7e530176719a678a35bdceff076ef6d136d8a03820fda02b51acde2c336de952b049a78396fe6a954be740414766fbbffa12fc98836c34a0
-
SSDEEP
24576:mycJDqllWkane4EQOdxmbFBj7UEiS6RJ4X/rZ77uYkMzTVoQ8xlQeM:1TbltndudeJ4X/l77uYkaTVofH
Malware Config
Extracted
redline
kedru
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral1/memory/1248-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1248-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1248-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000002341a-40.dat family_redline behavioral1/memory/3968-42-0x00000000007B0000-0x00000000007EC000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 776 sx7zF7bV.exe 4564 yB0UK0xi.exe 1068 EU1Ae4wu.exe 2976 Yl2IX5JG.exe 1148 1qx17eD8.exe 3968 2UY215SX.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" EU1Ae4wu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Yl2IX5JG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sx7zF7bV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" yB0UK0xi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1148 set thread context of 1248 1148 1qx17eD8.exe 89 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3984 wrote to memory of 776 3984 12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe 83 PID 3984 wrote to memory of 776 3984 12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe 83 PID 3984 wrote to memory of 776 3984 12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe 83 PID 776 wrote to memory of 4564 776 sx7zF7bV.exe 84 PID 776 wrote to memory of 4564 776 sx7zF7bV.exe 84 PID 776 wrote to memory of 4564 776 sx7zF7bV.exe 84 PID 4564 wrote to memory of 1068 4564 yB0UK0xi.exe 85 PID 4564 wrote to memory of 1068 4564 yB0UK0xi.exe 85 PID 4564 wrote to memory of 1068 4564 yB0UK0xi.exe 85 PID 1068 wrote to memory of 2976 1068 EU1Ae4wu.exe 86 PID 1068 wrote to memory of 2976 1068 EU1Ae4wu.exe 86 PID 1068 wrote to memory of 2976 1068 EU1Ae4wu.exe 86 PID 2976 wrote to memory of 1148 2976 Yl2IX5JG.exe 88 PID 2976 wrote to memory of 1148 2976 Yl2IX5JG.exe 88 PID 2976 wrote to memory of 1148 2976 Yl2IX5JG.exe 88 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 1148 wrote to memory of 1248 1148 1qx17eD8.exe 89 PID 2976 wrote to memory of 3968 2976 Yl2IX5JG.exe 90 PID 2976 wrote to memory of 3968 2976 Yl2IX5JG.exe 90 PID 2976 wrote to memory of 3968 2976 Yl2IX5JG.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe"C:\Users\Admin\AppData\Local\Temp\12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sx7zF7bV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sx7zF7bV.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yB0UK0xi.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yB0UK0xi.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EU1Ae4wu.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EU1Ae4wu.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Yl2IX5JG.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Yl2IX5JG.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qx17eD8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1qx17eD8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2UY215SX.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2UY215SX.exe6⤵
- Executes dropped EXE
PID:3968
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD515f27099061088d8c257669d4c74e481
SHA137853bef3910352a3b01ba302750c468b962d2da
SHA25687cd4299ec4c5d73e7816029ba406bbf0dae54f453b580b3aa4d37e1b65ecf9d
SHA5129ada90177a41fcdf63a938d57c88b921f3bd971c0a8d4e483e5eefc95055d8321ac0b0bbdb2d35187b9b74792e1a731def6a5ac7ce4fe2ef71c1b88043a16fef
-
Filesize
1.1MB
MD533ebfcac7d6fa9741faf68c11a99b5ea
SHA1d0cafca947b407af751c5f2be14e82c3d4c0ef33
SHA256a64309652f10da5354486f6164eacf9093bba10a58f12a80f506883a47c79140
SHA512e51f9191ee38c53c21673d97aa924768f9b42e268ad35d27a51ac417ba7519a817e797ce226fee48ef2d46d9c1400de7bfe2062f6de346fa045bbe1fadbbeaec
-
Filesize
754KB
MD5fb33b38c410ca28988e63708fe49c138
SHA12f577330de35ee067bc69cfc0fa5f62bb1576867
SHA256078dc808ebb36d067d981165d850afba09a18ada1c9d4cf3d0856a76d0a85317
SHA512044bbc50f867643f097c40d519b081538b196f2b8ce8216e8092f52490f0ccd8f415f74fe36574362bca7ec55282c7da7e5bc9cc94abb3d7add9bdf849059273
-
Filesize
558KB
MD5db9ff4bc4d353c73d1102e129347d406
SHA1ee42ba06c56eae8aafcb4ec782ec15866da1a7b8
SHA2562448ed5a870a586c65d2ce8818bb2705c5f7f0882f05614f40a6fea334c6ad95
SHA512b50eb25744367829064d2de75faf8f29f5599857a1100264bdee4eb2c2a32b672049e37f8841fe4b76f020894ced4a7df45bf77c270457b997c7912acdb00090
-
Filesize
1.0MB
MD5a5a72ed79ae5e9780a11e88e6c6853c2
SHA19c59ba2bdb9066bedc108596ed94633c824edec8
SHA2564d29c049f541cf4cfc30160228c05c981a115b3890004fb839ff261b99b62051
SHA51284b85e7ce7701c18bffba0a76a289ab8f43dffaa77604d2c4e3682feb3dd8e937a70b00aba3213c5303d3ffa7bfc7e97008d39505087ace7c3cce9baac9b9d88
-
Filesize
219KB
MD5da2e89d428425d025e2fd49a3942c68e
SHA16cb9c834d5209fdf9398f15671efbbe58c0a48b0
SHA2568a3a5f9092d7eae1010ef9bde83d50ec60fee44e16d5ee97a1e4589ec9567306
SHA512fe6fb8f30badccc93bbd9062de31c56f7c66dd6170161465bb46242d6f880eeaf0500c38d878f75fece909845b5d830ce3643ead1ce78df12dd5f431ac0fafc4