Overview
overview
10Static
static
3016b8fab11...90.exe
windows10-2004-x64
10046f35763e...68.exe
windows10-2004-x64
1014e25178ee...de.exe
windows10-2004-x64
1058609bf38b...1d.exe
windows10-2004-x64
105e46be5a16...b4.exe
windows10-2004-x64
1064220efa05...b0.exe
windows10-2004-x64
107252b3ba90...cd.exe
windows10-2004-x64
10761baf17cd...b8.exe
windows10-2004-x64
1079b34442d1...59.exe
windows10-2004-x64
107bca30b01b...44.exe
windows10-2004-x64
77f2d656f1a...24.exe
windows10-2004-x64
1092903f5aac...33.exe
windows10-2004-x64
10a6fd8428c6...ff.exe
windows10-2004-x64
10a9a24c6b40...79.exe
windows10-2004-x64
10c957c1f7d6...20.exe
windows10-2004-x64
10d30a3fe09c...90.exe
windows10-2004-x64
10d4c8c5a1d2...4e.exe
windows10-2004-x64
10e2ca05276c...37.exe
windows10-2004-x64
10e79c48869d...9a.exe
windows10-2004-x64
10fff53a878c...d6.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
016b8fab114770bc330d8c49bc8909920899011e9018ceeaa5233b1b572c4190.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
14e25178ee8b8712bc968c820fb869e90a44dec170ecd8a6483ae8f108b1f2de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5e46be5a1605d21562eda70cd21e2675e650c3789e8dde9dfb908ec546adc9b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64220efa0582fe1aec27096123429aeb58dc263d43340ad6613555ad427544b0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
79b34442d1c8507ff7bb7f184e63b7b674da3847ab0d3d8203b60c93467fa859.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7bca30b01b52faa483cb9bba6adca25589109b55d6cd6c01bb4219ef6d8f4444.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
a6fd8428c609450c9b2629eda53c7749e0bb145c64d6bcfc5071adec21c467ff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
a9a24c6b40b53ea0f85263a4222bf4792c43b7f26287058d9cd536b2ceb5a779.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
c957c1f7d6e812384412b37342974d2234a9d5e5aaa2e53f0e6e41977b4af020.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e2ca05276c37a88d337993eae49ec4ac99bf1c9f9e56112366021c7a649bf337.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe
Resource
win10v2004-20240426-en
General
-
Target
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe
-
Size
895KB
-
MD5
c275615581b1a287c46bd4914c645377
-
SHA1
dd08381740c7105dd3f5bffd1b006410952282a0
-
SHA256
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d
-
SHA512
aa616d9618d4abbf82b0b61f944f6beb655f1beb7cd66077706a63b299c08a58b977f813b61de7606b707d988cc50f556b12ca27c64a8756050c98034c0cba86
-
SSDEEP
12288:eMr+y90evp7ygaOcdT4rVF3XvoTELhfnxZOnok2+acz0vRquRC3KI63sNCl:syrp7ygPxM4lxZ8okicoRqxuswl
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/3284-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral4/memory/3284-30-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral4/memory/3284-32-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/3592-40-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral4/memory/1612-21-0x00000000021F0000-0x0000000002210000-memory.dmp net_reactor behavioral4/memory/1612-23-0x0000000002500000-0x000000000251E000-memory.dmp net_reactor -
Executes dropped EXE 6 IoCs
Processes:
bX4Xh51.exeBG8wd21.exe1rZ51MC3.exe2Qs4396.exe3ON50GN.exe4Sb330Cy.exepid process 3920 bX4Xh51.exe 2448 BG8wd21.exe 1612 1rZ51MC3.exe 4088 2Qs4396.exe 3004 3ON50GN.exe 1192 4Sb330Cy.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exebX4Xh51.exeBG8wd21.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" bX4Xh51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" BG8wd21.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2Qs4396.exe3ON50GN.exe4Sb330Cy.exedescription pid process target process PID 4088 set thread context of 3284 4088 2Qs4396.exe AppLaunch.exe PID 3004 set thread context of 1016 3004 3ON50GN.exe AppLaunch.exe PID 1192 set thread context of 3592 1192 4Sb330Cy.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1rZ51MC3.exedescription pid process Token: SeDebugPrivilege 1612 1rZ51MC3.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exebX4Xh51.exeBG8wd21.exe2Qs4396.exe3ON50GN.exe4Sb330Cy.exedescription pid process target process PID 1472 wrote to memory of 3920 1472 58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe bX4Xh51.exe PID 1472 wrote to memory of 3920 1472 58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe bX4Xh51.exe PID 1472 wrote to memory of 3920 1472 58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe bX4Xh51.exe PID 3920 wrote to memory of 2448 3920 bX4Xh51.exe BG8wd21.exe PID 3920 wrote to memory of 2448 3920 bX4Xh51.exe BG8wd21.exe PID 3920 wrote to memory of 2448 3920 bX4Xh51.exe BG8wd21.exe PID 2448 wrote to memory of 1612 2448 BG8wd21.exe 1rZ51MC3.exe PID 2448 wrote to memory of 1612 2448 BG8wd21.exe 1rZ51MC3.exe PID 2448 wrote to memory of 1612 2448 BG8wd21.exe 1rZ51MC3.exe PID 2448 wrote to memory of 4088 2448 BG8wd21.exe 2Qs4396.exe PID 2448 wrote to memory of 4088 2448 BG8wd21.exe 2Qs4396.exe PID 2448 wrote to memory of 4088 2448 BG8wd21.exe 2Qs4396.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 4088 wrote to memory of 3284 4088 2Qs4396.exe AppLaunch.exe PID 3920 wrote to memory of 3004 3920 bX4Xh51.exe 3ON50GN.exe PID 3920 wrote to memory of 3004 3920 bX4Xh51.exe 3ON50GN.exe PID 3920 wrote to memory of 3004 3920 bX4Xh51.exe 3ON50GN.exe PID 3004 wrote to memory of 2628 3004 3ON50GN.exe AppLaunch.exe PID 3004 wrote to memory of 2628 3004 3ON50GN.exe AppLaunch.exe PID 3004 wrote to memory of 2628 3004 3ON50GN.exe AppLaunch.exe PID 3004 wrote to memory of 1016 3004 3ON50GN.exe AppLaunch.exe PID 3004 wrote to memory of 1016 3004 3ON50GN.exe AppLaunch.exe PID 3004 wrote to memory of 1016 3004 3ON50GN.exe AppLaunch.exe PID 3004 wrote to memory of 1016 3004 3ON50GN.exe AppLaunch.exe PID 3004 wrote to memory of 1016 3004 3ON50GN.exe AppLaunch.exe PID 3004 wrote to memory of 1016 3004 3ON50GN.exe AppLaunch.exe PID 1472 wrote to memory of 1192 1472 58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe 4Sb330Cy.exe PID 1472 wrote to memory of 1192 1472 58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe 4Sb330Cy.exe PID 1472 wrote to memory of 1192 1472 58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe 4Sb330Cy.exe PID 1192 wrote to memory of 3592 1192 4Sb330Cy.exe AppLaunch.exe PID 1192 wrote to memory of 3592 1192 4Sb330Cy.exe AppLaunch.exe PID 1192 wrote to memory of 3592 1192 4Sb330Cy.exe AppLaunch.exe PID 1192 wrote to memory of 3592 1192 4Sb330Cy.exe AppLaunch.exe PID 1192 wrote to memory of 3592 1192 4Sb330Cy.exe AppLaunch.exe PID 1192 wrote to memory of 3592 1192 4Sb330Cy.exe AppLaunch.exe PID 1192 wrote to memory of 3592 1192 4Sb330Cy.exe AppLaunch.exe PID 1192 wrote to memory of 3592 1192 4Sb330Cy.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe"C:\Users\Admin\AppData\Local\Temp\58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bX4Xh51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bX4Xh51.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BG8wd21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BG8wd21.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1rZ51MC3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1rZ51MC3.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Qs4396.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Qs4396.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3ON50GN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3ON50GN.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2628
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Sb330Cy.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Sb330Cy.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD55a9e2b86a7d5dffaca4bd93d625a9a86
SHA122260a0a097e72edb69edec49ce89c451bcb674f
SHA25694b922d45866154829338361742b0d7d7f7abb4866dd84f9c979fb00e592ed72
SHA51266152963753435fa1a02dd415fb4b51240e92d44c81bc18c964633921587f999c685ffe8c13ff498c16191e0553ceef40e24d2758fc3173ca300f4226098729c
-
Filesize
643KB
MD5fb90e0de94f5c1ce94920457918ebe41
SHA185af7181e87172316d29a8d915f3f2a1ba9a622f
SHA256655ae7e41dc1a603bbeed725364d21d83d18ad26c747b265a598061b1fcd1b3e
SHA5124a11fd1575bf848ae36b5b058ecec888c5579d65b186df703a7024d9425010b532e20171924880c934d186bd1fe36337b5186c45a1a5ab8bb83213aad83bbba6
-
Filesize
178KB
MD582d0e5cc03cfbccaececce18d1bafce9
SHA1f1b5098008133ad5022661a3e592cba5c7172c66
SHA2562d0e5b754a1ab6eda0e304eeae14e16f4287d37d7bf948a504a781c9d04fdd21
SHA512cf8a98b7ccd8aa6644241d76865b78b5df43246cfddf2f93dc412142f4416bf5f3efe46efc7e2f5a8508c99e7e97d1bbec9c0b7bfb9f44b781c84f4afba55d70
-
Filesize
440KB
MD59fc2e8efa1d49928096e33fd76a07bc6
SHA14cc7d14abda807dd9151d9f2ea9bf7678223ba9e
SHA256118d41032860f1571767353fa908f5546fca889b192a1e1cc655431a43bfb095
SHA512866140feb62dfd0dae5b4d7482bddf8ad29e222e82cee2dac58b16269544fc3350b9f291b741478f0563d71147dca0f90814bd1c6fc2702a0777bdef1210623c
-
Filesize
188KB
MD5425e2a994509280a8c1e2812dfaad929
SHA14d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA2566f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0
-
Filesize
328KB
MD5321bbb44f6317afeb09a02c6a71cf26e
SHA12d4d3c414b6bfe780d150db528271ab0a2d354b5
SHA256dd34d0e61f9f42fd09d0d983e7c00dbed744307a084ea3af5562c99481664f72
SHA5124bd84e68233bd130964285f18e030444b6fba5f760a3ccf5c17bd6750c1ffd5c856a71a1a19677d8b33222bd1726dd8bcdc6d1adf8e439aa02f3388309368c3d