Overview
overview
10Static
static
3016b8fab11...90.exe
windows10-2004-x64
10046f35763e...68.exe
windows10-2004-x64
1014e25178ee...de.exe
windows10-2004-x64
1058609bf38b...1d.exe
windows10-2004-x64
105e46be5a16...b4.exe
windows10-2004-x64
1064220efa05...b0.exe
windows10-2004-x64
107252b3ba90...cd.exe
windows10-2004-x64
10761baf17cd...b8.exe
windows10-2004-x64
1079b34442d1...59.exe
windows10-2004-x64
107bca30b01b...44.exe
windows10-2004-x64
77f2d656f1a...24.exe
windows10-2004-x64
1092903f5aac...33.exe
windows10-2004-x64
10a6fd8428c6...ff.exe
windows10-2004-x64
10a9a24c6b40...79.exe
windows10-2004-x64
10c957c1f7d6...20.exe
windows10-2004-x64
10d30a3fe09c...90.exe
windows10-2004-x64
10d4c8c5a1d2...4e.exe
windows10-2004-x64
10e2ca05276c...37.exe
windows10-2004-x64
10e79c48869d...9a.exe
windows10-2004-x64
10fff53a878c...d6.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
016b8fab114770bc330d8c49bc8909920899011e9018ceeaa5233b1b572c4190.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
14e25178ee8b8712bc968c820fb869e90a44dec170ecd8a6483ae8f108b1f2de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5e46be5a1605d21562eda70cd21e2675e650c3789e8dde9dfb908ec546adc9b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64220efa0582fe1aec27096123429aeb58dc263d43340ad6613555ad427544b0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
79b34442d1c8507ff7bb7f184e63b7b674da3847ab0d3d8203b60c93467fa859.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7bca30b01b52faa483cb9bba6adca25589109b55d6cd6c01bb4219ef6d8f4444.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
a6fd8428c609450c9b2629eda53c7749e0bb145c64d6bcfc5071adec21c467ff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
a9a24c6b40b53ea0f85263a4222bf4792c43b7f26287058d9cd536b2ceb5a779.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
c957c1f7d6e812384412b37342974d2234a9d5e5aaa2e53f0e6e41977b4af020.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e2ca05276c37a88d337993eae49ec4ac99bf1c9f9e56112366021c7a649bf337.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe
Resource
win10v2004-20240426-en
General
-
Target
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe
-
Size
928KB
-
MD5
6de73278543ec875906fb3c292e51098
-
SHA1
3b9acda7cde3eebd35aaa0cd287a79f13edcce61
-
SHA256
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433
-
SHA512
81a541a41f9e96eb19a645e6e16d8c2dd80532d7186ba4aff04a6f5e1e38096ad4a6bcecf487a76dd922b708d8732ef0725f915b6d7f1b95cf1b8003314f761c
-
SSDEEP
24576:4yNx/u/e4828PhjEs++YqQ/q3GC6h38y7YdgecwmbDwuu:/Nx/Ee485Q66h3tYdge+D
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral12/memory/2072-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral12/memory/2072-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral12/memory/2072-29-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1715863.exe family_redline behavioral12/memory/552-35-0x0000000000120000-0x0000000000150000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
x3693943.exex1381890.exex2549134.exeg1410282.exeh1715863.exepid process 2168 x3693943.exe 4424 x1381890.exe 692 x2549134.exe 2480 g1410282.exe 552 h1715863.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exex3693943.exex1381890.exex2549134.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3693943.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1381890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2549134.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g1410282.exedescription pid process target process PID 2480 set thread context of 2072 2480 g1410282.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2108 2480 WerFault.exe g1410282.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exex3693943.exex1381890.exex2549134.exeg1410282.exedescription pid process target process PID 208 wrote to memory of 2168 208 92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe x3693943.exe PID 208 wrote to memory of 2168 208 92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe x3693943.exe PID 208 wrote to memory of 2168 208 92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe x3693943.exe PID 2168 wrote to memory of 4424 2168 x3693943.exe x1381890.exe PID 2168 wrote to memory of 4424 2168 x3693943.exe x1381890.exe PID 2168 wrote to memory of 4424 2168 x3693943.exe x1381890.exe PID 4424 wrote to memory of 692 4424 x1381890.exe x2549134.exe PID 4424 wrote to memory of 692 4424 x1381890.exe x2549134.exe PID 4424 wrote to memory of 692 4424 x1381890.exe x2549134.exe PID 692 wrote to memory of 2480 692 x2549134.exe g1410282.exe PID 692 wrote to memory of 2480 692 x2549134.exe g1410282.exe PID 692 wrote to memory of 2480 692 x2549134.exe g1410282.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 2480 wrote to memory of 2072 2480 g1410282.exe AppLaunch.exe PID 692 wrote to memory of 552 692 x2549134.exe h1715863.exe PID 692 wrote to memory of 552 692 x2549134.exe h1715863.exe PID 692 wrote to memory of 552 692 x2549134.exe h1715863.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe"C:\Users\Admin\AppData\Local\Temp\92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3693943.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3693943.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1381890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1381890.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2549134.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2549134.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1410282.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1410282.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 5526⤵
- Program crash
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1715863.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1715863.exe5⤵
- Executes dropped EXE
PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2480 -ip 24801⤵PID:1020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD50dd2a8e7ad60cb214f3b6e8763f0a30d
SHA19c5889ef6787529955445a6bfb43928702eeae3d
SHA256f0d264c1624cd196b93c7e8197d92a7c299357d1eaab8e904608ac89ca2a4413
SHA512477849ea9b975d63a5687c5826929b0801dc325748eca292e1adb1d2139cdbc72327902224bc304267d03f185652d5cda4b1411ec7f7a5ac4ba7fc7857c5268d
-
Filesize
556KB
MD5b360c5b0d85dd3c43f71ef31280bedee
SHA14a3158e3d8545ad613c9157eea9dabaf989c7a5e
SHA256c625af9d3602c3f1351cc53c582a55a34d82152d5c09dbf26fb5ab56f1462894
SHA5123368b9c0a3d4ad5acf6740685c1d12c1f7053307bb1d6a004c5560318cb8db267bc646cedd5bedac1114e6c3b8050a7004af2bf58017b37b428ac09b82b1a719
-
Filesize
390KB
MD59614acc46b0349449d23fec12ae4651a
SHA183a4d958cccc42066d5ae9a27160259261bb6447
SHA25667848020e95907888ca3b235c79ce5f31c34882a9cdfef5ac4c5118162f33b08
SHA512c1e764b98faf44af0200f2662017a4222f63d978834cdc4da3c7f713e83c59ef620e6e223e0a764018e6a278f74d18fbac72ef007c87a8304be933e4a4a9adda
-
Filesize
364KB
MD53eb8082924edae8bbbd92a02dc697906
SHA1a8cce836499c9f8e6227166e7bfe10d0c3f668b1
SHA25649fb355f83fde75d493ace0636630bb12ba5ae02c1641fba410281fba78af9d2
SHA512ba7e92de40898df20e510e09a44a1785a661e4d448032b4703639989ab27a6ed77e751aaf9a833c13b673f6a744ce4ac3c16226a37e2f4d5ff43648c31293053
-
Filesize
174KB
MD5d33815ad108006cddcc9d75c8b3a0158
SHA186019f7d33d15d093b75cb5f930351cf2d85ff84
SHA25679ef9c50ae8fe912a351f9210028468af66b6eb6a9ee2bda42e67e450f55dba5
SHA5125d5cc43aa6cc41ab5e0bfe7baeecf9282711b83078b9a5248272af86753b04eb45c5395eac417f76a4f28d24d7000bb6b32356d600d700b0922864b47f54bd58