Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
-
Size
1.0MB
-
MD5
747e37684f3601391f7c34c3bad3b714
-
SHA1
f962f15719a0ba24ea00deab14bdcbae53aa1331
-
SHA256
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1
-
SHA512
8e7b01da1c0b3e87e7315850674683d0d51c6515157d218f52fa4bb09477f9fe0e8a4ebff8b175c3d5994ed59b44cdb23c79122b8bd21b84561e9009ffcaabd5
-
SSDEEP
24576:9y/osSiG1X/awsTEK6/PupZmRlguBpAlclFpjCjswtSD:YApB+e0mHO4FVmsX
Malware Config
Extracted
redline
magia
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral11/memory/3500-56-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral11/memory/3500-57-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral11/memory/3500-59-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
Processes:
1On58eu0.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1On58eu0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1On58eu0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1On58eu0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1On58eu0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1On58eu0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1On58eu0.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral11/memory/2788-67-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
Processes:
qX9cX59.exeaw5TK96.exe1On58eu0.exe2Fe6310.exe3Jg60pJ.exe4xc124QE.exepid process 4212 qX9cX59.exe 3204 aw5TK96.exe 3364 1On58eu0.exe 3220 2Fe6310.exe 1656 3Jg60pJ.exe 4072 4xc124QE.exe -
Processes:
1On58eu0.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1On58eu0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1On58eu0.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exeqX9cX59.exeaw5TK96.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" qX9cX59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" aw5TK96.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2Fe6310.exe3Jg60pJ.exe4xc124QE.exedescription pid process target process PID 3220 set thread context of 3500 3220 2Fe6310.exe AppLaunch.exe PID 1656 set thread context of 556 1656 3Jg60pJ.exe AppLaunch.exe PID 4072 set thread context of 2788 4072 4xc124QE.exe AppLaunch.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 468 3220 WerFault.exe 2Fe6310.exe 1772 1656 WerFault.exe 3Jg60pJ.exe 1812 4072 WerFault.exe 4xc124QE.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1On58eu0.exepid process 3364 1On58eu0.exe 3364 1On58eu0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1On58eu0.exedescription pid process Token: SeDebugPrivilege 3364 1On58eu0.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exeqX9cX59.exeaw5TK96.exe2Fe6310.exe3Jg60pJ.exe4xc124QE.exedescription pid process target process PID 216 wrote to memory of 4212 216 7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe qX9cX59.exe PID 216 wrote to memory of 4212 216 7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe qX9cX59.exe PID 216 wrote to memory of 4212 216 7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe qX9cX59.exe PID 4212 wrote to memory of 3204 4212 qX9cX59.exe aw5TK96.exe PID 4212 wrote to memory of 3204 4212 qX9cX59.exe aw5TK96.exe PID 4212 wrote to memory of 3204 4212 qX9cX59.exe aw5TK96.exe PID 3204 wrote to memory of 3364 3204 aw5TK96.exe 1On58eu0.exe PID 3204 wrote to memory of 3364 3204 aw5TK96.exe 1On58eu0.exe PID 3204 wrote to memory of 3364 3204 aw5TK96.exe 1On58eu0.exe PID 3204 wrote to memory of 3220 3204 aw5TK96.exe 2Fe6310.exe PID 3204 wrote to memory of 3220 3204 aw5TK96.exe 2Fe6310.exe PID 3204 wrote to memory of 3220 3204 aw5TK96.exe 2Fe6310.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 3220 wrote to memory of 3500 3220 2Fe6310.exe AppLaunch.exe PID 4212 wrote to memory of 1656 4212 qX9cX59.exe 3Jg60pJ.exe PID 4212 wrote to memory of 1656 4212 qX9cX59.exe 3Jg60pJ.exe PID 4212 wrote to memory of 1656 4212 qX9cX59.exe 3Jg60pJ.exe PID 1656 wrote to memory of 556 1656 3Jg60pJ.exe AppLaunch.exe PID 1656 wrote to memory of 556 1656 3Jg60pJ.exe AppLaunch.exe PID 1656 wrote to memory of 556 1656 3Jg60pJ.exe AppLaunch.exe PID 1656 wrote to memory of 556 1656 3Jg60pJ.exe AppLaunch.exe PID 1656 wrote to memory of 556 1656 3Jg60pJ.exe AppLaunch.exe PID 1656 wrote to memory of 556 1656 3Jg60pJ.exe AppLaunch.exe PID 216 wrote to memory of 4072 216 7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe 4xc124QE.exe PID 216 wrote to memory of 4072 216 7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe 4xc124QE.exe PID 216 wrote to memory of 4072 216 7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe 4xc124QE.exe PID 4072 wrote to memory of 2788 4072 4xc124QE.exe AppLaunch.exe PID 4072 wrote to memory of 2788 4072 4xc124QE.exe AppLaunch.exe PID 4072 wrote to memory of 2788 4072 4xc124QE.exe AppLaunch.exe PID 4072 wrote to memory of 2788 4072 4xc124QE.exe AppLaunch.exe PID 4072 wrote to memory of 2788 4072 4xc124QE.exe AppLaunch.exe PID 4072 wrote to memory of 2788 4072 4xc124QE.exe AppLaunch.exe PID 4072 wrote to memory of 2788 4072 4xc124QE.exe AppLaunch.exe PID 4072 wrote to memory of 2788 4072 4xc124QE.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe"C:\Users\Admin\AppData\Local\Temp\7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qX9cX59.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qX9cX59.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aw5TK96.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aw5TK96.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1On58eu0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1On58eu0.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Fe6310.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Fe6310.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 5765⤵
- Program crash
PID:468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Jg60pJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Jg60pJ.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 5724⤵
- Program crash
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4xc124QE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4xc124QE.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 5723⤵
- Program crash
PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3220 -ip 32201⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1656 -ip 16561⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4072 -ip 40721⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD5fbfe5c96d0d82a2845ff443feae6e06e
SHA14e2da6fc702f2e9534deea48a91a6635034aba6e
SHA25653192853d576cf4b913978791ce964381b00fcc31e4bd1475d964f88bf4a659d
SHA512a48df613a1ecc419121154d48f92e57c541559cf47215102a82343fb13e1dccf850885874f174a8f0e67d0b1faf8f62a13d86857784823cb37239fc464e6f4dc
-
Filesize
743KB
MD59ff77508fadc21a51a032a904c62a87d
SHA13edd7dd64f386be42dac83061d2a6644e9695c13
SHA256e5af95224002c430d732fbd0adf080a628e7497f5f138aa39a790372c9cbb33a
SHA512d629a0f7e6eecfea8238914249de4bc813d7569c8e16c00d0ac2905d8fa67e56c5585bca131cc15f536d0e989a0afbc027119f7bdf0c3fa1cf3cfbe7b4d07d3a
-
Filesize
295KB
MD5240d5e99c5689ca4fc9f0c951bdb25ff
SHA1123be4fcec63e89cbd32df8bfc7fbc7ccaa54397
SHA256bd060a37035682883d6be6cf429572c2217b75b95c90d74fefd451519b41592c
SHA512a10aa1fa87a644d75fffcf7a504fe9ad5ebf5a742c80a3c6b652d35159116da00f4a003cbcc33539478bc8adee3bf3079255796c13cd03dd8caf2414c5b74882
-
Filesize
491KB
MD53040606c64399e8d5a01b4ceb1965bdb
SHA1c19eae83f3ed07f985751331a897b4f4a5e03178
SHA25673818c3fc38f4851e1c1abf1fe2dec895b03d1493e181f6da1912fe86e169f29
SHA51236e2b55a45d8dda31c5e769dfec88341cc90040f4a0bbdff090f76d7298f7ef7427fdb1d10cb5f6e6bf2ff1de8bacb2db64800ef081a875a8c849c7c42899211
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
445KB
MD559d72316ce680d4c9be5648586c2c5c1
SHA1eca6e05bdc29d35b0168a9724063c1e180580671
SHA25606d3ee4e9c53bf05477233eba404360752e190b2b61520643304dd50bd9bff67
SHA5128469f5c876cd31f4f2010838b7f83d8e76f16feebc5e002d7bbb9624e53b3f36cc31c430287cca7ca91fb033d7d700ae5f47137a52fe5c95b7f4fde47c8eabde