Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
-
Size
839KB
-
MD5
7f8ac6fc633a133ac4398d0460fce273
-
SHA1
40f71057a5b04b180960a954fb41aa832a404d22
-
SHA256
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea
-
SHA512
cf843a3711aff18abe98e081e4ade629eb0eebeccde423094ca7283dde8ec4082a38e862a413f0af9816060c7f8ae7d0dc308cd0c1148e52bcbc03d13158b799
-
SSDEEP
24576:zyMd2GFla0vq5RCW6gpgeD/sH71oaSUxgnhnmUG2M40:GMDFg0veCxgpLLS2ignZdG2M4
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral9/memory/4756-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral9/memory/4756-32-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral9/memory/4756-30-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral9/memory/2148-40-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral9/memory/3140-21-0x00000000020D0000-0x00000000020F0000-memory.dmp net_reactor behavioral9/memory/3140-23-0x0000000002160000-0x000000000217E000-memory.dmp net_reactor -
Executes dropped EXE 6 IoCs
pid Process 3196 Kz2XK66.exe 2720 gD6FW16.exe 3140 1St52ga2.exe 3272 2sE7031.exe 2140 3Fd70Sh.exe 2004 4hm869uB.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Kz2XK66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gD6FW16.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3272 set thread context of 4756 3272 2sE7031.exe 97 PID 2140 set thread context of 980 2140 3Fd70Sh.exe 103 PID 2004 set thread context of 2148 2004 4hm869uB.exe 109 -
Program crash 3 IoCs
pid pid_target Process procid_target 768 3272 WerFault.exe 93 4764 2140 WerFault.exe 101 4496 2004 WerFault.exe 106 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3140 1St52ga2.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 316 wrote to memory of 3196 316 779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe 82 PID 316 wrote to memory of 3196 316 779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe 82 PID 316 wrote to memory of 3196 316 779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe 82 PID 3196 wrote to memory of 2720 3196 Kz2XK66.exe 83 PID 3196 wrote to memory of 2720 3196 Kz2XK66.exe 83 PID 3196 wrote to memory of 2720 3196 Kz2XK66.exe 83 PID 2720 wrote to memory of 3140 2720 gD6FW16.exe 85 PID 2720 wrote to memory of 3140 2720 gD6FW16.exe 85 PID 2720 wrote to memory of 3140 2720 gD6FW16.exe 85 PID 2720 wrote to memory of 3272 2720 gD6FW16.exe 93 PID 2720 wrote to memory of 3272 2720 gD6FW16.exe 93 PID 2720 wrote to memory of 3272 2720 gD6FW16.exe 93 PID 3272 wrote to memory of 4980 3272 2sE7031.exe 95 PID 3272 wrote to memory of 4980 3272 2sE7031.exe 95 PID 3272 wrote to memory of 4980 3272 2sE7031.exe 95 PID 3272 wrote to memory of 4464 3272 2sE7031.exe 96 PID 3272 wrote to memory of 4464 3272 2sE7031.exe 96 PID 3272 wrote to memory of 4464 3272 2sE7031.exe 96 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3272 wrote to memory of 4756 3272 2sE7031.exe 97 PID 3196 wrote to memory of 2140 3196 Kz2XK66.exe 101 PID 3196 wrote to memory of 2140 3196 Kz2XK66.exe 101 PID 3196 wrote to memory of 2140 3196 Kz2XK66.exe 101 PID 2140 wrote to memory of 980 2140 3Fd70Sh.exe 103 PID 2140 wrote to memory of 980 2140 3Fd70Sh.exe 103 PID 2140 wrote to memory of 980 2140 3Fd70Sh.exe 103 PID 2140 wrote to memory of 980 2140 3Fd70Sh.exe 103 PID 2140 wrote to memory of 980 2140 3Fd70Sh.exe 103 PID 2140 wrote to memory of 980 2140 3Fd70Sh.exe 103 PID 316 wrote to memory of 2004 316 779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe 106 PID 316 wrote to memory of 2004 316 779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe 106 PID 316 wrote to memory of 2004 316 779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe 106 PID 2004 wrote to memory of 2412 2004 4hm869uB.exe 108 PID 2004 wrote to memory of 2412 2004 4hm869uB.exe 108 PID 2004 wrote to memory of 2412 2004 4hm869uB.exe 108 PID 2004 wrote to memory of 2148 2004 4hm869uB.exe 109 PID 2004 wrote to memory of 2148 2004 4hm869uB.exe 109 PID 2004 wrote to memory of 2148 2004 4hm869uB.exe 109 PID 2004 wrote to memory of 2148 2004 4hm869uB.exe 109 PID 2004 wrote to memory of 2148 2004 4hm869uB.exe 109 PID 2004 wrote to memory of 2148 2004 4hm869uB.exe 109 PID 2004 wrote to memory of 2148 2004 4hm869uB.exe 109 PID 2004 wrote to memory of 2148 2004 4hm869uB.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe"C:\Users\Admin\AppData\Local\Temp\779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Kz2XK66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Kz2XK66.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gD6FW16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gD6FW16.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1St52ga2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1St52ga2.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sE7031.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sE7031.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 6085⤵
- Program crash
PID:768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Fd70Sh.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Fd70Sh.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 5844⤵
- Program crash
PID:4764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4hm869uB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4hm869uB.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2412
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 5803⤵
- Program crash
PID:4496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3272 -ip 32721⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2140 -ip 21401⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2004 -ip 20041⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD52e82ee35715ee86201262ec7b9348fc9
SHA1927045936a1b36ecf21d696049bc655932cee19b
SHA256c7d694c80276b7057af297e407ddbfa59be3393d294dab592f8ea964652917d9
SHA51206cc7b36c84a2c310579afc8c8b16a4225db46b26aae608ab7d2e887edb3d2f3aa71cba1d669c2c21c8693b3c1f08f6bebf1cf505d0e041c0508d34aaca2b195
-
Filesize
605KB
MD5770ec911d1da5dfabe2269d37fc258d2
SHA1cc86e9ff23dd489e906ab4c5f165fd1bd07f5b61
SHA25670c4d425f3dbd1d61467da2ea78e680c3fb257b693fec0ec58d4f5b962162ba6
SHA512db1c1f62154e70edeeec9fd48a51a85816bb33b384ba4d7580d5b5e9744e1576311528a9e0d649cb0f5dba2457a375e0882d44e66911fbdb2153663abe3c618c
-
Filesize
145KB
MD562b61051dd313eeac2afb396429ca99a
SHA1deb0009d2f5fcd031e3391b205a8a02fcd464559
SHA256b68a611e953fb56f507e636345cdc43ce7f2d232e1e5762169615647c4977970
SHA512fbec9abaeb580e9ef2b8b64a136efe117e1743663ff4a6057ab12072db36891de14fec78e17e579109cf7668bf1f5af9beddfed4077fa5cfdf927b4516c15278
-
Filesize
421KB
MD5905dc84abad824db15c5c27841d8014e
SHA10b1a75d67fa04e1866071e7567cf93cdd0c02c55
SHA256c67452b80aaf2fcd46eed2fc6fc4ecf359d2b770f58ce026950426bee466b366
SHA51217bfe4c7f4829a0cfd46b30ab13b7c1390f5f6a4b175f9137333d88d75e09fc12cf1970ea950d022a2f8f4c4f5d3848b40a61491456c2adf7f6b5baa76b727ac
-
Filesize
188KB
MD5425e2a994509280a8c1e2812dfaad929
SHA14d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA2566f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0
-
Filesize
295KB
MD5a9fd9dd03d22c28426e283a9a4dfdd09
SHA12d7c2a83a8849f6c3311abfee6cd55da51453ea5
SHA2569bc1507b60ecdb26d8f09322403e6cfd7ca34d789ba7a7360c10715d497c3406
SHA512e939d29724848b3c7a764583676ee36199b9137c789f1512f62626d473f38d77110e4211568d13cd3b5268807b3bc810e1bd32275d8b22f053a1c23849cf7357