Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
-
Size
1.1MB
-
MD5
29f505918222d2923fa3bb617664ea33
-
SHA1
2b468ac0a3bb06e3d8fed347ae0cc227480c0fee
-
SHA256
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838
-
SHA512
e9904233debeb2f658b08d3bdc9dd08cb1540a7e4015c7576336ee2126616446a4f4e4c402901012ed829df199ad04055ae9536be144bab45ac24b6512086671
-
SSDEEP
24576:7yP+uO5OFQwmqtkMPHW6A0QbshuPVeRyHLqlHXo:uw5FR+lQbshKcyHLqlH
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral13/memory/4892-28-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral13/memory/4892-29-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral13/memory/4892-31-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2RW035Qh.exe family_redline behavioral13/memory/2752-35-0x0000000000BF0000-0x0000000000C2E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
hW4Hb0mU.exeKz7jr7Jt.exesm4CY4on.exe1Gd73Cl8.exe2RW035Qh.exepid process 4784 hW4Hb0mU.exe 4220 Kz7jr7Jt.exe 932 sm4CY4on.exe 1528 1Gd73Cl8.exe 2752 2RW035Qh.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
hW4Hb0mU.exeKz7jr7Jt.exesm4CY4on.exeb3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" hW4Hb0mU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Kz7jr7Jt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" sm4CY4on.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1Gd73Cl8.exedescription pid process target process PID 1528 set thread context of 4892 1528 1Gd73Cl8.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1668 1528 WerFault.exe 1Gd73Cl8.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exehW4Hb0mU.exeKz7jr7Jt.exesm4CY4on.exe1Gd73Cl8.exedescription pid process target process PID 2308 wrote to memory of 4784 2308 b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe hW4Hb0mU.exe PID 2308 wrote to memory of 4784 2308 b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe hW4Hb0mU.exe PID 2308 wrote to memory of 4784 2308 b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe hW4Hb0mU.exe PID 4784 wrote to memory of 4220 4784 hW4Hb0mU.exe Kz7jr7Jt.exe PID 4784 wrote to memory of 4220 4784 hW4Hb0mU.exe Kz7jr7Jt.exe PID 4784 wrote to memory of 4220 4784 hW4Hb0mU.exe Kz7jr7Jt.exe PID 4220 wrote to memory of 932 4220 Kz7jr7Jt.exe sm4CY4on.exe PID 4220 wrote to memory of 932 4220 Kz7jr7Jt.exe sm4CY4on.exe PID 4220 wrote to memory of 932 4220 Kz7jr7Jt.exe sm4CY4on.exe PID 932 wrote to memory of 1528 932 sm4CY4on.exe 1Gd73Cl8.exe PID 932 wrote to memory of 1528 932 sm4CY4on.exe 1Gd73Cl8.exe PID 932 wrote to memory of 1528 932 sm4CY4on.exe 1Gd73Cl8.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 1528 wrote to memory of 4892 1528 1Gd73Cl8.exe AppLaunch.exe PID 932 wrote to memory of 2752 932 sm4CY4on.exe 2RW035Qh.exe PID 932 wrote to memory of 2752 932 sm4CY4on.exe 2RW035Qh.exe PID 932 wrote to memory of 2752 932 sm4CY4on.exe 2RW035Qh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe"C:\Users\Admin\AppData\Local\Temp\b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hW4Hb0mU.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hW4Hb0mU.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Kz7jr7Jt.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Kz7jr7Jt.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sm4CY4on.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sm4CY4on.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Gd73Cl8.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Gd73Cl8.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 5886⤵
- Program crash
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2RW035Qh.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2RW035Qh.exe5⤵
- Executes dropped EXE
PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1528 -ip 15281⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD5fb04d85ed438dc626938d887b557b889
SHA19f238d0cf3fc1048d804270ea8e933f07fab1e05
SHA25609b60d2fc6bd1feb09dbea16ec2c78273a2d50e16495f60755a716062ba2e122
SHA512533a9637cc62354c3f6fcb81e8031f7a526dc235db562094ec4ceb4e97defc33a8cdb5a00ddf074679c20b498cc35b5b42ab90e4b846ed4ce57e730911698f15
-
Filesize
640KB
MD54e1351d70f0fd287651152f16f51c11a
SHA1a13c92f34bba25cedc08f4a8c1afd1482a2e6628
SHA25674b95bdafc114a7d701dd53826eea37384bcc3c7a05184e5891565ab28f7c2a2
SHA5124450c03c2eb28afcdc51570189e8899ef7f0727c79e482e5aa33e9fff85f5db0aafd7c20a2b3f4160bd4e3c30a03f5c491b270749e4ae82607b234371b370d13
-
Filesize
444KB
MD5b26fe864cea57f25a2bea46d92f25aa7
SHA1d826bc24c78374762039e43f84674f3183b1b258
SHA25632b8463ee9a1186aebb3bf574a89f5b6fe7f2de8a315c99617829ab6b89a2c91
SHA5122547a49e45ee9ecaa1f22d62d3947e355001be50e7d77c7baf384ef01a2fb82d84e334de2ab1f45a09edd7d8971cd951342891124a3f6822d7372ca075da757e
-
Filesize
423KB
MD50b5719994e67a8888baf8568d845b9bd
SHA13c52ff8bd30d34357db0111ac7939b8d406fa668
SHA2567f036b9930458495f8ff03e7636e0019cdedcb9d548ccae9aaf17f1f083b76ad
SHA5121c7605c132af72bed179f9b91c7c20da952f2bad35ca16ad40a477c3816c6d60d583cccaa582e86c92c2116ea10a092f747526c900cbd99306eb33799a095839
-
Filesize
221KB
MD55b209cb636a99b25077bed0e2db24a46
SHA1d2dbc38b3985ffb749b95f14f5e58cf03649642f
SHA2561f41459c9778c0915d63e9579ec9f27e9ceaf0e6b1f3edc5b49d8f2477e260d2
SHA5126047eab088d0778f9274b8bbdc172cc65f5655857b3288115538904a47c4a7d85c9009103620c1f36c74347999d009477245d3e0e749d1060dc00814296c031f