Overview
overview
10Static
static
33f631a363d...63.exe
windows10-2004-x64
10498a26c182...6f.exe
windows10-2004-x64
104b34c552db...dd.exe
windows10-2004-x64
10532834d8ce...8e.exe
windows10-2004-x64
105896992807...ed.exe
windows10-2004-x64
1059c0083cd8...df.exe
windows10-2004-x64
106fc46cbdbb...5c.exe
windows7-x64
106fc46cbdbb...5c.exe
windows10-2004-x64
108433f5b093...73.exe
windows7-x64
108433f5b093...73.exe
windows10-2004-x64
1086d4877bad...f4.exe
windows10-2004-x64
109b49de72ab...8f.exe
windows10-2004-x64
10b05d662dcb...df.exe
windows10-2004-x64
10b84e93b222...f7.exe
windows10-2004-x64
10bee0ec9430...1b.exe
windows10-2004-x64
10c95a5553b1...1a.exe
windows10-2004-x64
10ca54f6dfd1...d5.exe
windows10-2004-x64
10cca7f7e048...56.exe
windows10-2004-x64
10cf9a62d5a1...b4.exe
windows10-2004-x64
10d211b73bae...c6.exe
windows10-2004-x64
10eb23946a76...29.exe
windows10-2004-x64
7f2301f9ee1...18.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
498a26c182a4f66822f65140c2f38df8b9da8ced42ed08651892aa416b8e3b6f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4b34c552dbab5efc9560efa54f934de7c83ac3d7a313df811145ebfadf64c2dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
532834d8ce7000d8e7eb38c91e27411e3b18295ef7db64dc83c3982ac0a9ae8e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
5896992807f979d7483ac37e3ec58f2b7816d71d0c0cc96def5c78ddb0301ded.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
59c0083cd89906e6947197abc27233f2d2fdeb0cc852b57cd3a6e42063bc2adf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
6fc46cbdbb6e435050e052f67ee83426ac1f65c26e34bc81e339bbb10d07a55c.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
6fc46cbdbb6e435050e052f67ee83426ac1f65c26e34bc81e339bbb10d07a55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
86d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b05d662dcb605a8af070c2bd5fadda687e65adad15dca9ac32982db6ebd36bdf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bee0ec94302af9baabb3e2b4d22397424e0fa315031f65258b35135c92ff0b1b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c95a5553b1a709f22bba8f3f68e6c4c0eef94f99fcf143faebfb68ead35a0f1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
ca54f6dfd1d165cc099fcff983a1e0d5045ab7589a3cefbb07c34deaf08e0dd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
cca7f7e048cad1d80a1eeb878d27b78386889bd305ac5dd66bcf6ab8499b2256.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d211b73bae9760b12d1e027c009a4d8f4dbdb34ba630703d65ca56fc612e45c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
eb23946a76bf1590eafdacfb8f44604c986536b0b24a3b11f0aa7f8eb4722829.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f2301f9ee1f258528e83f30f1d7ea7bb59faa2f5d97139ddf14e0b5a805cd018.exe
Resource
win10v2004-20240426-en
General
-
Target
9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe
-
Size
1.1MB
-
MD5
d4eb079de1ab0ac84e37b3962f93c7fb
-
SHA1
5a3d086afad18c9ff744920abcb1ecdb7ea21e7f
-
SHA256
9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f
-
SHA512
7cf20358baa6de9e1cf07cf075e5207114c39422354357550a4b4373c7b658e104382672006e520831022f229d946847b625d6e9d2e766e298ef3143a5667927
-
SSDEEP
24576:qySdf32T6YZO24dqCqceSWcxTkd0p3FyXiNjkEtLxPj7bgOU:xCf3+Hc7KSHqC3wSVxPjIO
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral12/memory/2132-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/2132-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/2132-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xj253ya.exe family_redline behavioral12/memory/2140-42-0x0000000000C60000-0x0000000000C9E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
KC4dP6Dz.exeaC8Ep3kJ.exemz9Dv5rL.exezN9ng2Hs.exe1ue88pr5.exe2xj253ya.exepid process 3904 KC4dP6Dz.exe 5020 aC8Ep3kJ.exe 1444 mz9Dv5rL.exe 4636 zN9ng2Hs.exe 4472 1ue88pr5.exe 2140 2xj253ya.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exeKC4dP6Dz.exeaC8Ep3kJ.exemz9Dv5rL.exezN9ng2Hs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" KC4dP6Dz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" aC8Ep3kJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" mz9Dv5rL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" zN9ng2Hs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1ue88pr5.exedescription pid process target process PID 4472 set thread context of 2132 4472 1ue88pr5.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exeKC4dP6Dz.exeaC8Ep3kJ.exemz9Dv5rL.exezN9ng2Hs.exe1ue88pr5.exedescription pid process target process PID 3892 wrote to memory of 3904 3892 9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe KC4dP6Dz.exe PID 3892 wrote to memory of 3904 3892 9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe KC4dP6Dz.exe PID 3892 wrote to memory of 3904 3892 9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe KC4dP6Dz.exe PID 3904 wrote to memory of 5020 3904 KC4dP6Dz.exe aC8Ep3kJ.exe PID 3904 wrote to memory of 5020 3904 KC4dP6Dz.exe aC8Ep3kJ.exe PID 3904 wrote to memory of 5020 3904 KC4dP6Dz.exe aC8Ep3kJ.exe PID 5020 wrote to memory of 1444 5020 aC8Ep3kJ.exe mz9Dv5rL.exe PID 5020 wrote to memory of 1444 5020 aC8Ep3kJ.exe mz9Dv5rL.exe PID 5020 wrote to memory of 1444 5020 aC8Ep3kJ.exe mz9Dv5rL.exe PID 1444 wrote to memory of 4636 1444 mz9Dv5rL.exe zN9ng2Hs.exe PID 1444 wrote to memory of 4636 1444 mz9Dv5rL.exe zN9ng2Hs.exe PID 1444 wrote to memory of 4636 1444 mz9Dv5rL.exe zN9ng2Hs.exe PID 4636 wrote to memory of 4472 4636 zN9ng2Hs.exe 1ue88pr5.exe PID 4636 wrote to memory of 4472 4636 zN9ng2Hs.exe 1ue88pr5.exe PID 4636 wrote to memory of 4472 4636 zN9ng2Hs.exe 1ue88pr5.exe PID 4472 wrote to memory of 2864 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2864 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2864 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 536 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 536 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 536 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4472 wrote to memory of 2132 4472 1ue88pr5.exe AppLaunch.exe PID 4636 wrote to memory of 2140 4636 zN9ng2Hs.exe 2xj253ya.exe PID 4636 wrote to memory of 2140 4636 zN9ng2Hs.exe 2xj253ya.exe PID 4636 wrote to memory of 2140 4636 zN9ng2Hs.exe 2xj253ya.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe"C:\Users\Admin\AppData\Local\Temp\9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KC4dP6Dz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KC4dP6Dz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aC8Ep3kJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aC8Ep3kJ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mz9Dv5rL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mz9Dv5rL.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zN9ng2Hs.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zN9ng2Hs.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ue88pr5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ue88pr5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2864
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:536
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xj253ya.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xj253ya.exe6⤵
- Executes dropped EXE
PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5d57014c460afdbdd8855ec39c10381ae
SHA166dfd169fe55869751effefb2bd7deb8f5d2a885
SHA256a0d7530efc1f278c524d141d72928c381a1ba89996bc48a5dd37c19d040c0941
SHA5129b71d664be61aacc8cce526891dbcac9106d5b5cbd9f24585c898416d354b0fba0e9748b4b73f8179eaad15eb7bb148177d6972966c5027a504092c9474f864c
-
Filesize
839KB
MD5a1af291f11718026c5389177c8c3351f
SHA1409c8ab525024b35d1122e7904bd4f2c12212474
SHA2569bf0c34247430748d059baa7efe83d7001861ffb57caecf1dd09fd993b605429
SHA5122c1ce14e5c3ea39265b2f4596bd72153192ba9e0e275f1893597de5b377e2bc38d3e1f6be0b329ebbfbeacec5206c641d069f194804848c762c5f0d5dc4d556b
-
Filesize
591KB
MD597ac7c7fb76b7d9d14c7e5ced801d5cd
SHA14d0812c719dd9e4ffc3e1649de0fdf9d36ef9257
SHA2564b4f8f7e80b64da51496e517b02ac6d78aefb8ab3c8f9e268daf84c1c52ccf1f
SHA512128b2f786a7b53647b876b9fe4c9f7b2cb61f287ffe6fde4ff17f723edd76c909915c34ed9a097bcad3a297ea57069312377c441d42978c14272a2920265cf59
-
Filesize
396KB
MD5e4b7e6795aa65a1fd0671b89eb25fbd2
SHA15a4c2556ebd36073ac866106fc842fba0467b055
SHA2562f582272777de51bb5e2b8f214c796a0b250e78bfbf8a131ca99d6ca0e9cf262
SHA51292f6b5f8c4730c834fc3982b9833e94a6d91bb501cb4816f016761169a5163e6c06d3610a88a62653468e2a064ed1994f8f4b082b9285fcfa435ec51ef0025d1
-
Filesize
314KB
MD5cd8b0b182768d7b16455f96196adedb5
SHA1d554d3e37b6b9794fce3e691492f6d5bd15dbcd7
SHA25603867b690d2dc419b4a5295d29ea09abd0eb2d19a19a53a6e667b6a665762291
SHA51258ab27d605fea0ae342eb857be659758580042f4f10a4005bf9514c62b20ba3ed4945a02d73c559478afc1d2124e26a3f7b7eca0016a633ecb47563f99c3d816
-
Filesize
222KB
MD581bd277c6c50dc5a7388a6fbe2ff6026
SHA186a9fa2593fb92db39a406a919a0967b25920a2b
SHA256841637983861aed7ce0b8598a50b090427a1d2419edd9eca3ebc56081e92c8aa
SHA512e1c98fcdd44e386414cbc73bb7e4fd011fe39f27147604cd01bf474a7b061f8938c71ecff936509ce9a2e8d890f0a7d8dd703613f0347474c44b88266592f216