Overview
overview
10Static
static
30068388548...96.exe
windows10-2004-x64
1013243e4dd5...33.exe
windows10-2004-x64
10202040bebe...98.exe
windows10-2004-x64
103a1c464610...ff.exe
windows10-2004-x64
10556fc723a7...10.exe
windows10-2004-x64
75eb8ed45ba...01.exe
windows10-2004-x64
10663bf6b48c...37.exe
windows10-2004-x64
767dbedea2e...69.exe
windows10-2004-x64
107e4d47aad3...11.exe
windows10-2004-x64
10820ec15efb...db.exe
windows10-2004-x64
1088a5b8b09a...44.exe
windows10-2004-x64
109c0f7f6495...f7.exe
windows10-2004-x64
10bd0a957eae...c0.exe
windows7-x64
10bd0a957eae...c0.exe
windows10-2004-x64
10c8e229c276...39.exe
windows10-2004-x64
10ca2534058c...e4.exe
windows10-2004-x64
10d0c5f92763...68.exe
windows10-2004-x64
10d3f2262a94...31.exe
windows10-2004-x64
10d40527d1f8...ed.exe
windows10-2004-x64
10de4076a039...c9.exe
windows10-2004-x64
10f80bd79907...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
0068388548827b89762c020630c0e79519dedb7b7ff6c4f1c625aca59fbf5996.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
13243e4dd58e70de2748aff5360c6262fe2a6de7562acb1334b8a8adbb876f33.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
3a1c464610d6f381fd4237273e1990d1b05567b780bacaa50c4d2462441faeff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
556fc723a7eab0f91113f11d7171070d3875bbfca8f5e2397500b5ee832c0310.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
5eb8ed45ba47d4135feaee11bbc17194ba1e8dfa693a293e370a7725fcfcd401.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
663bf6b48c7a6589e9a0bbabacbb8b22b1556f79bd63892788caae034d162437.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
67dbedea2ea23fd4fe189651241dd1489f71cf6bb5803d660d3d7ecd91ff5669.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7e4d47aad3f9ebbd9422d69a7b96b1808810801c43b385031da5bd1472cbd411.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
820ec15efb9f2f70d27557121fc2619065a095a0db4a83720d911fc56bc7eedb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
88a5b8b09ad1e32abc7fce3415b25a2aa7be90802b17e91d650f6961ee4e8744.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d40527d1f87af48fe58a0377e98e5eafc8b6f2ba2f0023257f76d0c61f1096ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
de4076a0397d9f3a10c9a7ec7c19d95dd219e5330592bc236b71f5cea26f87c9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe
Resource
win10v2004-20240508-en
General
-
Target
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe
-
Size
811KB
-
MD5
cf846f7c594cd193b3ed42192f1aa70b
-
SHA1
cd8d543d7f3e31185a888037df93b430684d18bc
-
SHA256
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593
-
SHA512
b62d90a3b3556fdcc4d7c18eb86eeec31850c807200056558e037b40dddff2a0b7324accef115c7cbabbaafa29393f9b0c237f044c8b85b361a70974c779cf05
-
SSDEEP
24576:kyvaji1WUvRUmEyEihp3u3GRPYl7SYtdQ:zMi1WUumEyEihn+AY
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral21/memory/432-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral21/memory/432-23-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral21/memory/432-25-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral21/memory/432-22-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2El707HD.exe family_redline behavioral21/memory/3224-29-0x00000000002E0000-0x000000000031E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
JE1jK8xs.exeDd1HR7Vx.exe1hi53En0.exe2El707HD.exepid process 628 JE1jK8xs.exe 3240 Dd1HR7Vx.exe 3992 1hi53En0.exe 3224 2El707HD.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exeJE1jK8xs.exeDd1HR7Vx.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" JE1jK8xs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Dd1HR7Vx.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1hi53En0.exedescription pid process target process PID 3992 set thread context of 432 3992 1hi53En0.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 904 3992 WerFault.exe 1hi53En0.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exeJE1jK8xs.exeDd1HR7Vx.exe1hi53En0.exedescription pid process target process PID 2680 wrote to memory of 628 2680 f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe JE1jK8xs.exe PID 2680 wrote to memory of 628 2680 f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe JE1jK8xs.exe PID 2680 wrote to memory of 628 2680 f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe JE1jK8xs.exe PID 628 wrote to memory of 3240 628 JE1jK8xs.exe Dd1HR7Vx.exe PID 628 wrote to memory of 3240 628 JE1jK8xs.exe Dd1HR7Vx.exe PID 628 wrote to memory of 3240 628 JE1jK8xs.exe Dd1HR7Vx.exe PID 3240 wrote to memory of 3992 3240 Dd1HR7Vx.exe 1hi53En0.exe PID 3240 wrote to memory of 3992 3240 Dd1HR7Vx.exe 1hi53En0.exe PID 3240 wrote to memory of 3992 3240 Dd1HR7Vx.exe 1hi53En0.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3992 wrote to memory of 432 3992 1hi53En0.exe AppLaunch.exe PID 3240 wrote to memory of 3224 3240 Dd1HR7Vx.exe 2El707HD.exe PID 3240 wrote to memory of 3224 3240 Dd1HR7Vx.exe 2El707HD.exe PID 3240 wrote to memory of 3224 3240 Dd1HR7Vx.exe 2El707HD.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe"C:\Users\Admin\AppData\Local\Temp\f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JE1jK8xs.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JE1jK8xs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dd1HR7Vx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Dd1HR7Vx.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1hi53En0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1hi53En0.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 1365⤵
- Program crash
PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2El707HD.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2El707HD.exe4⤵
- Executes dropped EXE
PID:3224
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3992 -ip 39921⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD53dc107ab43c46c6e44aa7e38600f9453
SHA14409035d56091531c827acfbf5023ca4b8bcfaf0
SHA256128906b201e125f57cc1763f3cbd41bf17792b31454d28f6db5548278ef4dcc8
SHA51202f838ea394f52eaf88eabf04fbad67a6eb616452cb9e24fa1a40b5203af948a832944d44f3eec6100a77cd1b8cf973a2a55a1f5902610cc6079e5c1837173e0
-
Filesize
381KB
MD55008baf4d376af00e269ef43c28cd776
SHA1ac0d6c4247b996bf55841ac775d8952d106920bf
SHA256696265ce71db21041af5561cb63ac8eb774fa0c81479006489c92103b1ab772b
SHA512ead21772eea11adb80f3fcde9949b1a5b480c9e0e24e108021d2ebb3414127ca22ae1f11718eafa1e1a8b6cc5ca9dbe2d47f09e47c54fefd1c6108fa3750c6e1
-
Filesize
295KB
MD51ddd3b7949f8298e028f59e2a0bf2242
SHA160706d663681e29a76afce2f1b009779a6e5de61
SHA25673b6f66d7f25da07915a48851fab8b8a97f7230df6fbee474c69b06a3633c1c8
SHA51201e5eafc0896c6b5fcde7356d85608d94a17059d4bacf6fc05aecfc38ed932e071fa17eb449f1ff9d55e28962a2b2b8ae1446c4fdc7e6e0b3c058e7d3a45cc88
-
Filesize
222KB
MD597b5f2969da21c0197eea47590c42d4c
SHA14d28b20dfd93bac8bb31688c50e97dc43a99c29f
SHA2566c15de91b26f959259b3b567c99f12162c4f8deb04f1adb349f3183ad09441a2
SHA5127033f56c370eca87595f3ce8b54767d8f3bce008c625bdbd99d3b21523c10f85e3861eeea1e6ee9564aae4773c973e696635c4e13ece66ba3c0e61bca7c53739