Overview
overview
10Static
static
3016b8fab11...90.exe
windows10-2004-x64
10046f35763e...68.exe
windows10-2004-x64
1014e25178ee...de.exe
windows10-2004-x64
1058609bf38b...1d.exe
windows10-2004-x64
105e46be5a16...b4.exe
windows10-2004-x64
1064220efa05...b0.exe
windows10-2004-x64
107252b3ba90...cd.exe
windows10-2004-x64
10761baf17cd...b8.exe
windows10-2004-x64
1079b34442d1...59.exe
windows10-2004-x64
107bca30b01b...44.exe
windows10-2004-x64
77f2d656f1a...24.exe
windows10-2004-x64
1092903f5aac...33.exe
windows10-2004-x64
10a6fd8428c6...ff.exe
windows10-2004-x64
10a9a24c6b40...79.exe
windows10-2004-x64
10c957c1f7d6...20.exe
windows10-2004-x64
10d30a3fe09c...90.exe
windows10-2004-x64
10d4c8c5a1d2...4e.exe
windows10-2004-x64
10e2ca05276c...37.exe
windows10-2004-x64
10e79c48869d...9a.exe
windows10-2004-x64
10fff53a878c...d6.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
016b8fab114770bc330d8c49bc8909920899011e9018ceeaa5233b1b572c4190.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
14e25178ee8b8712bc968c820fb869e90a44dec170ecd8a6483ae8f108b1f2de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5e46be5a1605d21562eda70cd21e2675e650c3789e8dde9dfb908ec546adc9b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64220efa0582fe1aec27096123429aeb58dc263d43340ad6613555ad427544b0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
79b34442d1c8507ff7bb7f184e63b7b674da3847ab0d3d8203b60c93467fa859.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7bca30b01b52faa483cb9bba6adca25589109b55d6cd6c01bb4219ef6d8f4444.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
a6fd8428c609450c9b2629eda53c7749e0bb145c64d6bcfc5071adec21c467ff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
a9a24c6b40b53ea0f85263a4222bf4792c43b7f26287058d9cd536b2ceb5a779.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
c957c1f7d6e812384412b37342974d2234a9d5e5aaa2e53f0e6e41977b4af020.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e2ca05276c37a88d337993eae49ec4ac99bf1c9f9e56112366021c7a649bf337.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe
Resource
win10v2004-20240426-en
General
-
Target
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe
-
Size
819KB
-
MD5
f89fddde3d9714fc698fc708de161a7a
-
SHA1
1a9af029df06aa8cbf4a1b3e7e25079bf3c347f4
-
SHA256
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e
-
SHA512
dc3153f743b911f934668ebfa48377756fbec4f102f836c2fb933b9344d08dcc742b2d58c4d3ed07060c886d7220ee84f130554dc791f106d8fa3ea05ea6acf7
-
SSDEEP
24576:ry1LboSWg7clqL9Ii9tvVtPQrIdnnw93:e1LsSWwcl6fvVtPPdnc
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral17/memory/408-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral17/memory/408-25-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral17/memory/408-23-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral17/memory/408-22-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral17/files/0x00070000000233e0-27.dat family_redline behavioral17/memory/2408-29-0x0000000000900000-0x000000000093E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4732 Qt5Ox4yn.exe 4780 fM0GH3nm.exe 2652 1lT98ol5.exe 2408 2oJ022sA.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qt5Ox4yn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fM0GH3nm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2652 set thread context of 408 2652 1lT98ol5.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 1152 2652 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4732 2692 d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe 81 PID 2692 wrote to memory of 4732 2692 d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe 81 PID 2692 wrote to memory of 4732 2692 d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe 81 PID 4732 wrote to memory of 4780 4732 Qt5Ox4yn.exe 82 PID 4732 wrote to memory of 4780 4732 Qt5Ox4yn.exe 82 PID 4732 wrote to memory of 4780 4732 Qt5Ox4yn.exe 82 PID 4780 wrote to memory of 2652 4780 fM0GH3nm.exe 83 PID 4780 wrote to memory of 2652 4780 fM0GH3nm.exe 83 PID 4780 wrote to memory of 2652 4780 fM0GH3nm.exe 83 PID 2652 wrote to memory of 4376 2652 1lT98ol5.exe 90 PID 2652 wrote to memory of 4376 2652 1lT98ol5.exe 90 PID 2652 wrote to memory of 4376 2652 1lT98ol5.exe 90 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 2652 wrote to memory of 408 2652 1lT98ol5.exe 91 PID 4780 wrote to memory of 2408 4780 fM0GH3nm.exe 95 PID 4780 wrote to memory of 2408 4780 fM0GH3nm.exe 95 PID 4780 wrote to memory of 2408 4780 fM0GH3nm.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe"C:\Users\Admin\AppData\Local\Temp\d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qt5Ox4yn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qt5Ox4yn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fM0GH3nm.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fM0GH3nm.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1lT98ol5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1lT98ol5.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 5885⤵
- Program crash
PID:1152
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2oJ022sA.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2oJ022sA.exe4⤵
- Executes dropped EXE
PID:2408
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2652 -ip 26521⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
584KB
MD5c84cbcb1e5fec8264e42493bcbe5eaf9
SHA1d2e86b19e8461d0d406f6ba8662af8edb2a1dce9
SHA25697ed2581cf602b5ef1336e862f3de5e776e88bfd87aea5100281050cd163be5e
SHA5127d871fffd2a058c4972118ed332094371d8f9400dd66b08b2ac2ff191164f220de755ab270e2d717ad516ac500c6454aa7a9cc9423ea68d83cfcd643e23e2775
-
Filesize
383KB
MD5434ab44f0ff61ddedeb8cd193bf06dd5
SHA1e950775714e5d415a03bd861a8b2760d92e63b4e
SHA256812996904b2bbae0465be949d1a4820ad8466edce073018f2765246604ebc794
SHA5120dc804f72f7306a8d1c6a3b7284d9208f254db369c8fc1096e00ea9f481d9d240810137562da4ac0de8bed0faf581bbd7f9335fb70a53a651c626ad6ac95b8b5
-
Filesize
298KB
MD5fdb8c7360f7ab13d6f1d38b8548dd75a
SHA12250d40cadea9d40267c262d8285f533c564208c
SHA256d6c844dfab6dcc477fe11687f6b098fa9c66fc15a4c7ae9984faaf647e1fcd7a
SHA512a0b2f5560e68ca558ff6d600a4e2a49a63dab25ecc39e06ec481e3580bb43a393e542936e275a1fed2b554dc0b296bb71321870e96aaff6a5449b96e8167c9a4
-
Filesize
222KB
MD5a6d1fca3c9d29a76548e684799abf99a
SHA1eb591c51e55a343bd86ca29245efd824248ba553
SHA25695a0b44533ec469f93a3ffb56cb9b37fa0594b763d34b1d86727c7ba9fa085fd
SHA5123a5362e90dd5d53498c1cce3f9f9673bdf00053787a93d93290d5abec82dc6f3e4c404aebf65084f4e3df782d4e039be620c06e79dfe5cff28dae1b999d08f80