Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
-
Size
1.1MB
-
MD5
958b8b7d0630648f74a8a205376639c7
-
SHA1
27f77d759c810b0ba6fdbe55fc3b992ef02c9def
-
SHA256
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70
-
SHA512
eb82e6be4aa2bc873897fa51d7846660e7dfc4ad50a73f6e04126b451208a5474a11a1daad0680579ac3b6016d2e057fb37089d8c2ba3e2f02b1fd4e8b7a923b
-
SSDEEP
24576:syk7IXTxaXrMWlBKgZy2XTWvUKY7hV2/nX1p5J7dvtQZ7/:bw8U5fPy2Xisr2/nX1XJnQZ
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral12/memory/5000-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/5000-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/5000-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral12/files/0x000700000002344a-40.dat family_redline behavioral12/memory/4456-42-0x0000000000420000-0x000000000045E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2696 iX0DW5OX.exe 5080 vB6kW7pK.exe 1580 MV8ml0vE.exe 1616 FD3iK0sA.exe 3276 1fk99GE7.exe 4456 2ay647MW.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" MV8ml0vE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" FD3iK0sA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" iX0DW5OX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vB6kW7pK.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3276 set thread context of 5000 3276 1fk99GE7.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 1108 3276 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2696 2124 994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe 83 PID 2124 wrote to memory of 2696 2124 994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe 83 PID 2124 wrote to memory of 2696 2124 994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe 83 PID 2696 wrote to memory of 5080 2696 iX0DW5OX.exe 84 PID 2696 wrote to memory of 5080 2696 iX0DW5OX.exe 84 PID 2696 wrote to memory of 5080 2696 iX0DW5OX.exe 84 PID 5080 wrote to memory of 1580 5080 vB6kW7pK.exe 85 PID 5080 wrote to memory of 1580 5080 vB6kW7pK.exe 85 PID 5080 wrote to memory of 1580 5080 vB6kW7pK.exe 85 PID 1580 wrote to memory of 1616 1580 MV8ml0vE.exe 86 PID 1580 wrote to memory of 1616 1580 MV8ml0vE.exe 86 PID 1580 wrote to memory of 1616 1580 MV8ml0vE.exe 86 PID 1616 wrote to memory of 3276 1616 FD3iK0sA.exe 87 PID 1616 wrote to memory of 3276 1616 FD3iK0sA.exe 87 PID 1616 wrote to memory of 3276 1616 FD3iK0sA.exe 87 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 3276 wrote to memory of 5000 3276 1fk99GE7.exe 91 PID 1616 wrote to memory of 4456 1616 FD3iK0sA.exe 96 PID 1616 wrote to memory of 4456 1616 FD3iK0sA.exe 96 PID 1616 wrote to memory of 4456 1616 FD3iK0sA.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe"C:\Users\Admin\AppData\Local\Temp\994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iX0DW5OX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iX0DW5OX.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vB6kW7pK.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vB6kW7pK.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\MV8ml0vE.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\MV8ml0vE.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\FD3iK0sA.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\FD3iK0sA.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fk99GE7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fk99GE7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 5847⤵
- Program crash
PID:1108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ay647MW.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ay647MW.exe6⤵
- Executes dropped EXE
PID:4456
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3276 -ip 32761⤵PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1001KB
MD5ea5e7167ef5825993558f8ff50932f84
SHA1e360c244c9f2f4d82d696f90d1f80b015a79281b
SHA2563dd49334968e552843c5d612005cc0ecdc7c9262a633119af74cca08632760d4
SHA51285f2f5caef4f1d14d9b75bcfe68c559ad909d121848549649861d21741b9bc3607734a835e4cc4ae1b82f5558093213100c72c2d9241cef696a0e332d02968e2
-
Filesize
811KB
MD5e08fcc93c42441403d6df3a5bbcfb2a5
SHA1568029fc4dd79a35b34ceedd13e8237cd1e27d32
SHA2560694181c66c2252cb3299088adeb007ea662cc18bdba84c8414d038ec47499fa
SHA5127db9627954708168a00058a1b7f91645723aae447449382e17f3837af6f06cfdffb0703f20ae2f3b51e595d8647a9e532f15bc05193e8e9d22fc178842046494
-
Filesize
577KB
MD58f1b607c8f0e60983b3997840d26da4a
SHA1c1e3811c7db7d9e55c6304cdf668c0955dc27a1d
SHA256735133e2da3dbb905e7a169587a219e04747979e6fe9b29fc46cef4a90365f4a
SHA51235c58fdb21247e8d7310176870b9a00b98da2debf3dac5915422b6ed79aae872771bea9f0a8071a74259c9253c891a34b5d20228db03f3dd48ba6746b3ecc4b3
-
Filesize
381KB
MD5785ac154c2dc9babf822a19e513b0dce
SHA1b103ea296c272e7003598d299528268ad3b70aba
SHA2569ee414dd62a9bfc7b4a32a0a52880f50e76507c5f290d7be9f44fc2667cccd2e
SHA512438b6507620a435fff5792aa3f9bc4f1db5f6562e4859d74ede70b1aff2cc639d379a69242ba299762cd833e3cfbcfb665ccd6956d2f64bc5e480c24eb8d321d
-
Filesize
295KB
MD50ec71ed1c13e939663ff358d46a575e6
SHA1a87f740c587abc7315c2816246f53df49af1fcf2
SHA256cc346ce966c1cd7294d2032819c4ab7a9d7ecde3ce12f99816a15c864ed33815
SHA51236b5c87fca4d727ddb4e0b6c2e35240a66ba161e501d6534728c15f4d8324dda391fead9b853a52053d0d5093a245e97d2e1f3ce716d38bc299b74997c3d2c29
-
Filesize
222KB
MD5ff92f02e8e2bd00152fac55a998b1c63
SHA1f7986124276898bdb12bdbbb9b890d691f437794
SHA256719d3e8abc9264ac32784111dca54b64c191fdf89230238bd8c24e5656b75a00
SHA512494d727317024d32afa4e7001f2edef4062687609d44ade8079331d2e594067e05bec8a9cc7f3c635ccb823a4b958109c7bb638483b661a0c943d1cb037616a5