Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
-
Size
1009KB
-
MD5
0230fb1015985d0e43e328c72f9d98c8
-
SHA1
96a53c65d6cbbdf0054d18258400547ab5a1c8b9
-
SHA256
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f
-
SHA512
7608ccd420016472530e440c2c2976e1aeeb66aa99d4483e146f1206d657cc945bbd163b70a5620308eaf3291385cc9517822edb3bf3de6970e3d0127e14bf3a
-
SSDEEP
24576:ByRsDICik0gGuggDbsVqImYHlcCORzoLdAy6KFf:0sTikcu5sgImqcCldA
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral20/memory/1820-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral20/memory/1820-31-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral20/memory/1820-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral20/files/0x0007000000023414-33.dat family_redline behavioral20/memory/3688-35-0x0000000000D50000-0x0000000000D8E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 1616 ne8SV7Op.exe 2728 Ru6eo9bh.exe 2948 Th9yL0Sg.exe 892 1Vo85ag1.exe 3688 2yu340PF.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ne8SV7Op.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ru6eo9bh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Th9yL0Sg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 892 set thread context of 1820 892 1Vo85ag1.exe 103 -
Program crash 1 IoCs
pid pid_target Process procid_target 3536 892 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4312 wrote to memory of 1616 4312 f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe 85 PID 4312 wrote to memory of 1616 4312 f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe 85 PID 4312 wrote to memory of 1616 4312 f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe 85 PID 1616 wrote to memory of 2728 1616 ne8SV7Op.exe 86 PID 1616 wrote to memory of 2728 1616 ne8SV7Op.exe 86 PID 1616 wrote to memory of 2728 1616 ne8SV7Op.exe 86 PID 2728 wrote to memory of 2948 2728 Ru6eo9bh.exe 87 PID 2728 wrote to memory of 2948 2728 Ru6eo9bh.exe 87 PID 2728 wrote to memory of 2948 2728 Ru6eo9bh.exe 87 PID 2948 wrote to memory of 892 2948 Th9yL0Sg.exe 89 PID 2948 wrote to memory of 892 2948 Th9yL0Sg.exe 89 PID 2948 wrote to memory of 892 2948 Th9yL0Sg.exe 89 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 892 wrote to memory of 1820 892 1Vo85ag1.exe 103 PID 2948 wrote to memory of 3688 2948 Th9yL0Sg.exe 107 PID 2948 wrote to memory of 3688 2948 Th9yL0Sg.exe 107 PID 2948 wrote to memory of 3688 2948 Th9yL0Sg.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe"C:\Users\Admin\AppData\Local\Temp\f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ne8SV7Op.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ne8SV7Op.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ru6eo9bh.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ru6eo9bh.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Th9yL0Sg.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Th9yL0Sg.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vo85ag1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vo85ag1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 5566⤵
- Program crash
PID:3536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2yu340PF.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2yu340PF.exe5⤵
- Executes dropped EXE
PID:3688
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 892 -ip 8921⤵PID:3720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
819KB
MD552077c0d14a863b19aef9ab03bf1708c
SHA1b93d64ad349a008bfce6a8dbc811b3219b4a4d9a
SHA256d5b6119b890dbd769291ef474d2e2ad27993fbb9573d6ddbf39474b10a62bcfb
SHA51292bc2437f7eb9edd66843cf38dd3c44165498f5b4a118c30dda69f1eae2397e50cff394680d34029bc934158abdd4201928058fc975ccc256cd714bd9407126c
-
Filesize
584KB
MD58714c11e6ae14a357e342bfb9e3d2a93
SHA10b83f1f09389c15e175e12bc3e31f2dfc1d15dd4
SHA2565ea59b5307645ed1056721ed0ecc270bd2158c14b64b4400299e82bd8b990841
SHA51282d5917f0cf7b3100ae1f0161f9780e10b7ef51f73e523f5f1d3160cb609e49f0bab2233afa89d74fcb0a82a74467780c52e057b03541e0d81a127f7a3e320eb
-
Filesize
383KB
MD58ff284938218fa2a8f6da2116e97bdb6
SHA155f943204300cebec5f0e04f6427c002a8296f6f
SHA2567463f743ba755950505978a4f39b650bfcfcee6a26e12929e99be345a40c3085
SHA512bdcc6e552b6a70dd523a8f74bd824c12fec7ea36ea1dc142444ace3b67c82810d5dc576797e2c88cf611dd4261cdddc35a0f57cace516e42649ca38fc0ea1c28
-
Filesize
298KB
MD54cef4b73bc39722617bee83cbfebba01
SHA182acd0994cecb43fa033f2ef0dd3344df262b746
SHA2569913b763f91f6661ef1f4fd06c9cdec83e19e9decfabfe6be5f0929b8edfb464
SHA51280703d217e9fafde09538fc53cc8ca234eac53642b65238b63fd438bc6a3dbc5a16d26a53314060b2c43c5d08e7fc33f6022c252f0e0e87eb52c3b52fa6d25a5
-
Filesize
222KB
MD5f3578771cf29f7659d3d9e4182f953e2
SHA1ad240a58f63bb8c95b77d6f9ff68707b4d3b9ff6
SHA256043bee2556aecc85d2b058609355bbebbb46fb59d895e913c5ede8f528fd0ba7
SHA5120018b7bc4b3b4ccc09d850ccd4b5cf272fa35dc4766e046487a2d6a39169ffdcbfb96730a9d914b28da53d4dfc08e1a689f84d1641ddf8b87f92fba4b7d87890