Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
-
Size
1008KB
-
MD5
c90aac7f3ef9e1256cdb06254c6ec05f
-
SHA1
cc7232bbe0ede8bea9b17584af009cb89e738b74
-
SHA256
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2
-
SHA512
19897bbcea64232554cca01af459ce3b99724ed4c85279c77e08afa702fa03da9ce1f34d2dc7fd719d391925d1cbcf9a650202af0db4fb1151f425453d81fef0
-
SSDEEP
24576:NylINAMFhoMHmqvrkN7r8XRyuu6zcFbn+:ooAIhDWady1
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/1220-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral4/memory/1220-31-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral4/memory/1220-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2hk771cr.exe family_redline behavioral4/memory/4712-35-0x00000000006D0000-0x000000000070E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
Wm7Iz8cl.exeIH2Gs2zk.exeDd5UM2DR.exe1uN15BD9.exe2hk771cr.exepid process 3224 Wm7Iz8cl.exe 4796 IH2Gs2zk.exe 3484 Dd5UM2DR.exe 2136 1uN15BD9.exe 4712 2hk771cr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exeWm7Iz8cl.exeIH2Gs2zk.exeDd5UM2DR.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Wm7Iz8cl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" IH2Gs2zk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Dd5UM2DR.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1uN15BD9.exedescription pid process target process PID 2136 set thread context of 1220 2136 1uN15BD9.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1700 2136 WerFault.exe 1uN15BD9.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exeWm7Iz8cl.exeIH2Gs2zk.exeDd5UM2DR.exe1uN15BD9.exedescription pid process target process PID 3832 wrote to memory of 3224 3832 3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe Wm7Iz8cl.exe PID 3832 wrote to memory of 3224 3832 3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe Wm7Iz8cl.exe PID 3832 wrote to memory of 3224 3832 3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe Wm7Iz8cl.exe PID 3224 wrote to memory of 4796 3224 Wm7Iz8cl.exe IH2Gs2zk.exe PID 3224 wrote to memory of 4796 3224 Wm7Iz8cl.exe IH2Gs2zk.exe PID 3224 wrote to memory of 4796 3224 Wm7Iz8cl.exe IH2Gs2zk.exe PID 4796 wrote to memory of 3484 4796 IH2Gs2zk.exe Dd5UM2DR.exe PID 4796 wrote to memory of 3484 4796 IH2Gs2zk.exe Dd5UM2DR.exe PID 4796 wrote to memory of 3484 4796 IH2Gs2zk.exe Dd5UM2DR.exe PID 3484 wrote to memory of 2136 3484 Dd5UM2DR.exe 1uN15BD9.exe PID 3484 wrote to memory of 2136 3484 Dd5UM2DR.exe 1uN15BD9.exe PID 3484 wrote to memory of 2136 3484 Dd5UM2DR.exe 1uN15BD9.exe PID 2136 wrote to memory of 4728 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 4728 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 4728 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 2136 wrote to memory of 1220 2136 1uN15BD9.exe AppLaunch.exe PID 3484 wrote to memory of 4712 3484 Dd5UM2DR.exe 2hk771cr.exe PID 3484 wrote to memory of 4712 3484 Dd5UM2DR.exe 2hk771cr.exe PID 3484 wrote to memory of 4712 3484 Dd5UM2DR.exe 2hk771cr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe"C:\Users\Admin\AppData\Local\Temp\3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wm7Iz8cl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wm7Iz8cl.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IH2Gs2zk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IH2Gs2zk.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dd5UM2DR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Dd5UM2DR.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1uN15BD9.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1uN15BD9.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4728
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 5726⤵
- Program crash
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2hk771cr.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2hk771cr.exe5⤵
- Executes dropped EXE
PID:4712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1036,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=3816 /prefetch:81⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2136 -ip 21361⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
819KB
MD549dc96424c9f6584a41276278a87e69e
SHA11b7bba55c1eb77891f54ca54310691e10edadabd
SHA2569f63b232bb13eb2f8d6103a7323e402c23a26c42d369e91bce3e2fc84fd4b677
SHA51229326f11827c29d491d70f55327dddd081476638b857335a5a1f196be5d0179f5d8281527379669f56594c255577fcc2fbbe98a1534b151e4ec8472dfc0d624a
-
Filesize
583KB
MD554600f6319ca0778a743373e47f5a54f
SHA18fcad567c6021cdb590485ade4db4d967ae80638
SHA256e499fb09760b6760775e22bffedb2ac3167311c3791d75847fe9fd7e6dadb743
SHA5123ff4c18fa182f6e99791584d2005e63a9621c2ceb2d3929500ae122a028ff8e8eb65902f15274b190abb6549661be9bd33a83e1b21b5ab9dabf770c4b6543ab4
-
Filesize
383KB
MD55b00562e3d4083b33969af27e9e69953
SHA1e69867211df1d5970765e7c3a62dc7b02fbb20d4
SHA2561d1f6fd05e5d39bd7ce7a542fe5ccf9da1a8cf286db00dbe7636cff24305f3f2
SHA512540f7d9a65ec593670fc55b2ea9d635e3776ba9c9464722fea9e7618d575f0bc1ee308b5a859ebf0a0192f217ab0c64d51e808ee0843c037ed013233bae5906c
-
Filesize
298KB
MD5b2066ebb2652f7e2bf734fb2fb986ba0
SHA1ea667fda1a5763d1c532467ed3d4211225ea6d5c
SHA256879e73ba0991f7809db7158fe259e4d1c2d410158669ba86e729affb0f8aa350
SHA5122f8443e6d7590fd9f34f611d62e4413ab15254b9ced30c847e329b85d02509d01d619f78e94f4250574cbe3d69baa33f346137cce2c7557d01af2314ae89a3b3
-
Filesize
222KB
MD52b47028b1e3838231052dab20daf1606
SHA1bd34d5f76b7ad72575cce43b2f1f8e7b150c18ee
SHA256303051b82a456b3cf7f1c74f600820c16d9b5ab853e752ae18e375df5ccfa282
SHA5121a8f10069aa42766301492b2784a1cd363e7a751a9f63a07ff280d44bff91e72acaca2975d8e3f8c1ff1fc0d57825e26fff35fdda0266986f7104677d1126d79