Overview
overview
10Static
static
3016b8fab11...90.exe
windows10-2004-x64
10046f35763e...68.exe
windows10-2004-x64
1014e25178ee...de.exe
windows10-2004-x64
1058609bf38b...1d.exe
windows10-2004-x64
105e46be5a16...b4.exe
windows10-2004-x64
1064220efa05...b0.exe
windows10-2004-x64
107252b3ba90...cd.exe
windows10-2004-x64
10761baf17cd...b8.exe
windows10-2004-x64
1079b34442d1...59.exe
windows10-2004-x64
107bca30b01b...44.exe
windows10-2004-x64
77f2d656f1a...24.exe
windows10-2004-x64
1092903f5aac...33.exe
windows10-2004-x64
10a6fd8428c6...ff.exe
windows10-2004-x64
10a9a24c6b40...79.exe
windows10-2004-x64
10c957c1f7d6...20.exe
windows10-2004-x64
10d30a3fe09c...90.exe
windows10-2004-x64
10d4c8c5a1d2...4e.exe
windows10-2004-x64
10e2ca05276c...37.exe
windows10-2004-x64
10e79c48869d...9a.exe
windows10-2004-x64
10fff53a878c...d6.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
016b8fab114770bc330d8c49bc8909920899011e9018ceeaa5233b1b572c4190.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
14e25178ee8b8712bc968c820fb869e90a44dec170ecd8a6483ae8f108b1f2de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5e46be5a1605d21562eda70cd21e2675e650c3789e8dde9dfb908ec546adc9b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64220efa0582fe1aec27096123429aeb58dc263d43340ad6613555ad427544b0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
79b34442d1c8507ff7bb7f184e63b7b674da3847ab0d3d8203b60c93467fa859.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7bca30b01b52faa483cb9bba6adca25589109b55d6cd6c01bb4219ef6d8f4444.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
a6fd8428c609450c9b2629eda53c7749e0bb145c64d6bcfc5071adec21c467ff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
a9a24c6b40b53ea0f85263a4222bf4792c43b7f26287058d9cd536b2ceb5a779.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
c957c1f7d6e812384412b37342974d2234a9d5e5aaa2e53f0e6e41977b4af020.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e2ca05276c37a88d337993eae49ec4ac99bf1c9f9e56112366021c7a649bf337.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe
Resource
win10v2004-20240426-en
General
-
Target
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe
-
Size
1.1MB
-
MD5
8928e859550f225a0fa2c3727e6f551a
-
SHA1
a2ac88ff7cdfd0337a2df772802de116a2001344
-
SHA256
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a
-
SHA512
496746371015da58117348e6ba82f814f46a0d1fd5383ef1265abf968906f418bf09d9b3bede061ee57dd17187618a15fe21b1fd45aec12abea819163e86eedd
-
SSDEEP
24576:NyAHA7bV1IlZkQCi3ED34dM1gaqiANXL4sVBN3Hp0FbK4+Hg4:oxHyCiUD34n1hNXL7N3Gg
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral19/memory/4652-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral19/memory/4652-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral19/memory/4652-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023444-41.dat family_redline behavioral19/memory/4396-42-0x0000000000FF0000-0x000000000102E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1056 mr6fe1Ad.exe 4556 uC5iM7zq.exe 664 RE9fs9fY.exe 1888 Sp3zD1OT.exe 3864 1jh48il7.exe 4396 2oG933Dg.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" RE9fs9fY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Sp3zD1OT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" mr6fe1Ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" uC5iM7zq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3864 set thread context of 4652 3864 1jh48il7.exe 110 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3464 wrote to memory of 1056 3464 e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe 83 PID 3464 wrote to memory of 1056 3464 e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe 83 PID 3464 wrote to memory of 1056 3464 e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe 83 PID 1056 wrote to memory of 4556 1056 mr6fe1Ad.exe 84 PID 1056 wrote to memory of 4556 1056 mr6fe1Ad.exe 84 PID 1056 wrote to memory of 4556 1056 mr6fe1Ad.exe 84 PID 4556 wrote to memory of 664 4556 uC5iM7zq.exe 85 PID 4556 wrote to memory of 664 4556 uC5iM7zq.exe 85 PID 4556 wrote to memory of 664 4556 uC5iM7zq.exe 85 PID 664 wrote to memory of 1888 664 RE9fs9fY.exe 86 PID 664 wrote to memory of 1888 664 RE9fs9fY.exe 86 PID 664 wrote to memory of 1888 664 RE9fs9fY.exe 86 PID 1888 wrote to memory of 3864 1888 Sp3zD1OT.exe 88 PID 1888 wrote to memory of 3864 1888 Sp3zD1OT.exe 88 PID 1888 wrote to memory of 3864 1888 Sp3zD1OT.exe 88 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 3864 wrote to memory of 4652 3864 1jh48il7.exe 110 PID 1888 wrote to memory of 4396 1888 Sp3zD1OT.exe 111 PID 1888 wrote to memory of 4396 1888 Sp3zD1OT.exe 111 PID 1888 wrote to memory of 4396 1888 Sp3zD1OT.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe"C:\Users\Admin\AppData\Local\Temp\e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mr6fe1Ad.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mr6fe1Ad.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uC5iM7zq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uC5iM7zq.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\RE9fs9fY.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\RE9fs9fY.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Sp3zD1OT.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Sp3zD1OT.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1jh48il7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1jh48il7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2oG933Dg.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2oG933Dg.exe6⤵
- Executes dropped EXE
PID:4396
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a33bec5a4ff5bee6094c6790a486df7f
SHA19ae1ff1202b847d29c84398fd0b84a12f87e10b4
SHA256a72aaab98fd4cc954f263d2715662c53ffa7d4222d50900192c6ab2109a99f0a
SHA5122f797f31e18d70de09a57e790117b2569f2596261c6023fe88cffa01cfb761b948d8c8e3ae16a40c3499f9949eaed4d0d964cf38cdfa33550aa69eda576537ca
-
Filesize
844KB
MD5c9c21a0c100d324c30fd3b55f0ed4542
SHA18f11ddd8bd31b952c9a960c92f220da833f8b5a7
SHA256bcbc5eaefea6789d2c1f8bf4824cef403414b4a387f6847a5a86b20e7061b862
SHA512170c14c28dadb643da7b54cdb7bcbfeb92a51a0df87b238c6f324f137a070760ae4253fa01ac84c53ef0761ff05d033ba6fc882f191706c3204ac633fe49c993
-
Filesize
594KB
MD586cd2582ed91306f05a61d7ae23b31e5
SHA1d0d010c336d1f52aa685a7f3f59ec66895d4582e
SHA25603bd331490a904c6323e87fd14ff45c960b7d64a6e115dbce903cf89e6b0f5bc
SHA512c485d947d479c366e32d2b7d1733626cea8b971bdc5ea9d1a57f583a29748c825fabacebf179c713f9e3655b843b9dfefb7850d7fb1052b27dcdc46ef00a0aa4
-
Filesize
398KB
MD51efa9b18a2563ebebae8a6eabad4db7b
SHA1b95bc070b14bbb19b209b2d4413db63f79272fbc
SHA256e2e852038c1504d54c9702b961095f0af961417103d2a5c8b10740dc188ac5e5
SHA51207bf09d5fa8798b9f0d40650c180275c78e201abd9d5ebfb37d2d37dcb55e0802d6c4e35467695aeec3c930add915d200847bd13ee41bc58762f067b553de5bb
-
Filesize
320KB
MD55d46d756761c7b1440076303beeca0ef
SHA18e50680d58c89566cf78b067aefed754d9fc4935
SHA2568ef43142ccd7fbffcd0c4fa2ed3a196f7a964f71753dfc37a895d956e02e0c83
SHA51219457218e35c87deade73de832140d6def871159eeec74a0df5c72dc0d56757a36c36a17327a73af6f03c6d8ca86d2f031f5d0364222dfcefc49df0d88758683
-
Filesize
222KB
MD53a2fb4ae3cb49d3452da38d13bb9a4c9
SHA1b1aadf5266265ab50b01330037fec3405cf4501a
SHA256f97449c137f4f454706cd578b7345a4b56fb2dd066558af125773e0ed8b2326a
SHA5128d1913bf768b1e39e1eaf8ed67b9b47f2e00fb3897a767bbb665c0715bb10f551293aabdc6d6429c26455c364a686cca225596471147813cec679e522c84dcce