Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
158s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
-
Size
713KB
-
MD5
3b44aab959d46df5ff3374adfa5b575b
-
SHA1
ff6d6362f5139c2a650bafb90a6b1ee78a53a608
-
SHA256
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e
-
SHA512
42c5db052b01548d1d843a169a264ba87a20f790397ae968c0d0096b7dcb1342596b7067ad4a1bc36409382dceeeff9b4be51c45c602164815000c1d4e44d77a
-
SSDEEP
12288:5Mrty90odAKlKWsDZ0NGmcF1DepG5J/+nfUrggA1T5V46Bl3h7l+eHqHSRJuSfGn:0yXAlPScfCpG5J+nfUSrzjlFK+7v415
Malware Config
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral5/memory/412-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral5/memory/412-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral5/memory/412-24-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral5/memory/412-25-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral5/memory/648-37-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 7oL2ze77.exe -
Executes dropped EXE 6 IoCs
pid Process 1456 IH7Iq97.exe 3472 PV9sE19.exe 4316 1fW25Kc2.exe 1412 2ra3967.exe 2948 6nB5Kx1.exe 2368 7oL2ze77.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" IH7Iq97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" PV9sE19.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4316 set thread context of 412 4316 1fW25Kc2.exe 94 PID 2948 set thread context of 648 2948 6nB5Kx1.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ra3967.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ra3967.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ra3967.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1412 2ra3967.exe 1412 2ra3967.exe 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found 3316 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1412 2ra3967.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found Token: SeShutdownPrivilege 3316 Process not Found Token: SeCreatePagefilePrivilege 3316 Process not Found -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1456 4068 4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe 90 PID 4068 wrote to memory of 1456 4068 4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe 90 PID 4068 wrote to memory of 1456 4068 4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe 90 PID 1456 wrote to memory of 3472 1456 IH7Iq97.exe 91 PID 1456 wrote to memory of 3472 1456 IH7Iq97.exe 91 PID 1456 wrote to memory of 3472 1456 IH7Iq97.exe 91 PID 3472 wrote to memory of 4316 3472 PV9sE19.exe 92 PID 3472 wrote to memory of 4316 3472 PV9sE19.exe 92 PID 3472 wrote to memory of 4316 3472 PV9sE19.exe 92 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 4316 wrote to memory of 412 4316 1fW25Kc2.exe 94 PID 3472 wrote to memory of 1412 3472 PV9sE19.exe 95 PID 3472 wrote to memory of 1412 3472 PV9sE19.exe 95 PID 3472 wrote to memory of 1412 3472 PV9sE19.exe 95 PID 1456 wrote to memory of 2948 1456 IH7Iq97.exe 96 PID 1456 wrote to memory of 2948 1456 IH7Iq97.exe 96 PID 1456 wrote to memory of 2948 1456 IH7Iq97.exe 96 PID 2948 wrote to memory of 648 2948 6nB5Kx1.exe 98 PID 2948 wrote to memory of 648 2948 6nB5Kx1.exe 98 PID 2948 wrote to memory of 648 2948 6nB5Kx1.exe 98 PID 2948 wrote to memory of 648 2948 6nB5Kx1.exe 98 PID 2948 wrote to memory of 648 2948 6nB5Kx1.exe 98 PID 2948 wrote to memory of 648 2948 6nB5Kx1.exe 98 PID 2948 wrote to memory of 648 2948 6nB5Kx1.exe 98 PID 2948 wrote to memory of 648 2948 6nB5Kx1.exe 98 PID 4068 wrote to memory of 2368 4068 4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe 99 PID 4068 wrote to memory of 2368 4068 4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe 99 PID 4068 wrote to memory of 2368 4068 4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe 99 PID 2368 wrote to memory of 1548 2368 7oL2ze77.exe 100 PID 2368 wrote to memory of 1548 2368 7oL2ze77.exe 100 PID 2368 wrote to memory of 1548 2368 7oL2ze77.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe"C:\Users\Admin\AppData\Local\Temp\4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IH7Iq97.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IH7Iq97.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PV9sE19.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PV9sE19.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1fW25Kc2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1fW25Kc2.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2ra3967.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2ra3967.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6nB5Kx1.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6nB5Kx1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7oL2ze77.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7oL2ze77.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\is64.bat" "3⤵PID:1548
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3784 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD56bfb531c225a70a7307ca0c116a4e80f
SHA16215748eda1b82c1fc62d8cdc5b64ea479801918
SHA256c6ed97bece0f0c55d992292a964758620ebfafb20640e54242a5ccf4c84192e2
SHA512e255fee12474f0452836035bea2315a03b017af5ebd881b1abec263b8aaac6dc3c8e6193431f0adfa6702c511bc0f06b3a042fc8ff3bdf551d3c52544dbfdc1f
-
Filesize
591KB
MD58dd1466b44c3563dd089942bc5490269
SHA1cace87c8d63bef64603130a1f26bb07ddedfd8f2
SHA256c227efd5b27da7d284dcdc860277d8af9415ea32a24db1f706061379de122044
SHA5129a4ad05e0857b42a79072022bafde682a3a19877a136e9de8c11fcf90415e2512c8cdf40547420d978ca95308b675d2ea6927fa380525ff735ac6706b8419b12
-
Filesize
358KB
MD5250b9e7a803d0d21f5315e7e7cc7ce2b
SHA1b2e4e984b8e1de270da3aba6f379e250f252de08
SHA256f9dfc483725cf3185690d1fc0206c360691a07cf9bcbf634ee90c69215312ba3
SHA512ecba68ab49e017c5ff5d219cff46955a454dfaee1602ee270b91dc5814de20a9eb9d5775ec9c0dd5076b70e7873adac73b07d44e8d9fe13c6c3dc62a9a90ca9d
-
Filesize
344KB
MD5a2a013dcdd4b163fc7f1105aafb3464b
SHA19aa8dd21befcc589b6c0844a14ca3285213f4124
SHA2567c7f66c513dc50bc719105251cb23edc6a8dac7747eb71b1faae8162fe947f82
SHA5125a97395ca250858f6c90fc80ce8e09e6d8d5a2c8a0b067da76e4e5902438712f3a50f6034eb2a7f997b6470a66737876cc537e6650941a07eca013a68320e03c
-
Filesize
319KB
MD510697784260e7d29fd5c401701b53ec6
SHA1f0b1f766c5e78e6c85694005571171581284ab2b
SHA2561521edc83245005bc209b480e94acc0f100a58d19a05a461a05927b62ca1c55f
SHA512a67518429b79b3ec590ed4005691d8ee4b21a29f9e4e0195a623899f23d5080bd7c6bd157cc781824f39145e26ce8f519af4690b02db5264d5bb0c78bc346dd1
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
181B
MD5225edee1d46e0a80610db26b275d72fb
SHA1ce206abf11aaf19278b72f5021cc64b1b427b7e8
SHA256e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559
SHA5124f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504