Overview
overview
10Static
static
33f631a363d...63.exe
windows10-2004-x64
10498a26c182...6f.exe
windows10-2004-x64
104b34c552db...dd.exe
windows10-2004-x64
10532834d8ce...8e.exe
windows10-2004-x64
105896992807...ed.exe
windows10-2004-x64
1059c0083cd8...df.exe
windows10-2004-x64
106fc46cbdbb...5c.exe
windows7-x64
106fc46cbdbb...5c.exe
windows10-2004-x64
108433f5b093...73.exe
windows7-x64
108433f5b093...73.exe
windows10-2004-x64
1086d4877bad...f4.exe
windows10-2004-x64
109b49de72ab...8f.exe
windows10-2004-x64
10b05d662dcb...df.exe
windows10-2004-x64
10b84e93b222...f7.exe
windows10-2004-x64
10bee0ec9430...1b.exe
windows10-2004-x64
10c95a5553b1...1a.exe
windows10-2004-x64
10ca54f6dfd1...d5.exe
windows10-2004-x64
10cca7f7e048...56.exe
windows10-2004-x64
10cf9a62d5a1...b4.exe
windows10-2004-x64
10d211b73bae...c6.exe
windows10-2004-x64
10eb23946a76...29.exe
windows10-2004-x64
7f2301f9ee1...18.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
3f631a363d36dce5c91238bcde6bb465721778887e036ad1016b185a4b4f9a63.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
498a26c182a4f66822f65140c2f38df8b9da8ced42ed08651892aa416b8e3b6f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4b34c552dbab5efc9560efa54f934de7c83ac3d7a313df811145ebfadf64c2dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
532834d8ce7000d8e7eb38c91e27411e3b18295ef7db64dc83c3982ac0a9ae8e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
5896992807f979d7483ac37e3ec58f2b7816d71d0c0cc96def5c78ddb0301ded.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
59c0083cd89906e6947197abc27233f2d2fdeb0cc852b57cd3a6e42063bc2adf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
6fc46cbdbb6e435050e052f67ee83426ac1f65c26e34bc81e339bbb10d07a55c.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
6fc46cbdbb6e435050e052f67ee83426ac1f65c26e34bc81e339bbb10d07a55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
86d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
9b49de72ab9ae9caaaf0da01fbe6d5bef6546c46b1e0c0b4c4c3f211eaec728f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b05d662dcb605a8af070c2bd5fadda687e65adad15dca9ac32982db6ebd36bdf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b84e93b22256809e5241bcee59acc31b9865bdae579891d641826e1e159b15f7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bee0ec94302af9baabb3e2b4d22397424e0fa315031f65258b35135c92ff0b1b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c95a5553b1a709f22bba8f3f68e6c4c0eef94f99fcf143faebfb68ead35a0f1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
ca54f6dfd1d165cc099fcff983a1e0d5045ab7589a3cefbb07c34deaf08e0dd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
cca7f7e048cad1d80a1eeb878d27b78386889bd305ac5dd66bcf6ab8499b2256.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d211b73bae9760b12d1e027c009a4d8f4dbdb34ba630703d65ca56fc612e45c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
eb23946a76bf1590eafdacfb8f44604c986536b0b24a3b11f0aa7f8eb4722829.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f2301f9ee1f258528e83f30f1d7ea7bb59faa2f5d97139ddf14e0b5a805cd018.exe
Resource
win10v2004-20240426-en
General
-
Target
cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe
-
Size
1.1MB
-
MD5
95573ab04fabc6686129f917a970354b
-
SHA1
580c9581f15227a6f3b338d4cb7c50faa77e0cf3
-
SHA256
cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4
-
SHA512
cf50641dce3a009b68071be0e80df5778a3344fecdf328e1b44e91b5e8b1b555b12543a1f799124862a6db13af3af0c6f87680ec2fb81cff20b1c682fe78d89c
-
SSDEEP
24576:fyjP1DXW75bmjvQpgiIjaR1ai8mj2sGEcSC3R+gAGxD:qjdDXsy0rR1Bd2sGEcSC33nx
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral19/memory/4852-28-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral19/memory/4852-31-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral19/memory/4852-29-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023433-33.dat family_redline behavioral19/memory/4088-35-0x00000000002B0000-0x00000000002EE000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 1540 sX1Dm8BD.exe 4720 dv3Yq8sG.exe 4844 as2fX5rj.exe 5096 1Kv84Cc7.exe 4088 2yi860ZD.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dv3Yq8sG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" as2fX5rj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sX1Dm8BD.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5096 set thread context of 4852 5096 1Kv84Cc7.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 772 5096 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3984 wrote to memory of 1540 3984 cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe 83 PID 3984 wrote to memory of 1540 3984 cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe 83 PID 3984 wrote to memory of 1540 3984 cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe 83 PID 1540 wrote to memory of 4720 1540 sX1Dm8BD.exe 84 PID 1540 wrote to memory of 4720 1540 sX1Dm8BD.exe 84 PID 1540 wrote to memory of 4720 1540 sX1Dm8BD.exe 84 PID 4720 wrote to memory of 4844 4720 dv3Yq8sG.exe 86 PID 4720 wrote to memory of 4844 4720 dv3Yq8sG.exe 86 PID 4720 wrote to memory of 4844 4720 dv3Yq8sG.exe 86 PID 4844 wrote to memory of 5096 4844 as2fX5rj.exe 87 PID 4844 wrote to memory of 5096 4844 as2fX5rj.exe 87 PID 4844 wrote to memory of 5096 4844 as2fX5rj.exe 87 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 5096 wrote to memory of 4852 5096 1Kv84Cc7.exe 90 PID 4844 wrote to memory of 4088 4844 as2fX5rj.exe 94 PID 4844 wrote to memory of 4088 4844 as2fX5rj.exe 94 PID 4844 wrote to memory of 4088 4844 as2fX5rj.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe"C:\Users\Admin\AppData\Local\Temp\cf9a62d5a117aaa03d348685a49a3a176c6dd3ef98e68cdcecaabe67cee3aab4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sX1Dm8BD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sX1Dm8BD.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dv3Yq8sG.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dv3Yq8sG.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\as2fX5rj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\as2fX5rj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kv84Cc7.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Kv84Cc7.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 5806⤵
- Program crash
PID:772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2yi860ZD.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2yi860ZD.exe5⤵
- Executes dropped EXE
PID:4088
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5096 -ip 50961⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
948KB
MD59b916b6c903f9d4d554cb515daf8cc9f
SHA135cf9344416aece5b70ecc2ee9659542af87d74f
SHA256c2955ee84390349793d06ace28dd83dcce930e1b49a4242829ebdb48d2a4a62f
SHA5129ad2bcf0223a2c01ce062af17b82a98f104e3f628064dcb6c8f574343f28b405d8bc8d964114654d36f33e52805f8f7b1a25ce2d676f9c8deb8a0297c6cf815d
-
Filesize
646KB
MD543a9f86ca551a47559dd3824a3ddf0a6
SHA18d249a225fa1d92a2aea5aab08aad766cf527ee0
SHA2560ee9adc5aff470d9f2640eb1aeae485b199a86082142b2059462262fbfc47eff
SHA5128d71c7d8b9a393e26cec37438101d82a6a907f713eeb2ac81d15046bd65b0a20535f417cdc782427f8ad8c045223dbf7ad1b12118f8368a89fcbfb9402a00a12
-
Filesize
450KB
MD5e24ec14773ea9acf68c0c1367c48f75e
SHA1135c3591aac893c52633424e556612dfa5d97b69
SHA2567ca06755cbf43f91394fbf3d8b6e7991b6f73d00366dc25584928cbcd033366c
SHA512ed26c6c6b189fd93311729e32bdc3455688bce9df7d51e7d30d30884b0ffd406b39095521feb2f295dfb28908228955193717a9e007921aaf4ffe5aa7224d499
-
Filesize
447KB
MD5d82d3103faaf8ba7c351502eefafd6b2
SHA1157b9de74d76e1f86a9d30e2d1eb9412160531ff
SHA25609d06e5064a12cc03f68fd9e0037a251a303066d987641c9132b83c9176f210e
SHA51278a8da94c96f764d6ae82754e3b3676981751f5414cb7487d384d40707df3e536dbf74d7d26ba8f3e50eae624b05c13491dfd28e8be2f5f8bb72b1c5bb713866
-
Filesize
221KB
MD5eca12c453aa37b180b6dcf478445b6d7
SHA1297aba3501bd52c2487a15270ab72f49632e18e2
SHA256d4cd571df85b3b6fb3a19f00ebde7009b379280547b0fbfc2eca0bbecdddb85a
SHA5123e45da26a5733afcd9d5e303c4464a42c42652360c543967a9f0b196680c86daeaadb5dba2d9cf0f4d2e5db813addcf0b76ab936df6d936e0cb39f3ddebb3d75