Overview
overview
10Static
static
30697314d1d...a5.exe
windows10-2004-x64
100f998493b8...79.exe
windows10-2004-x64
1021e1937094...38.exe
windows10-2004-x64
102800d64eb3...31.exe
windows10-2004-x64
103d64fae31a...d7.exe
windows10-2004-x64
10652a4e2d36...35.exe
windows10-2004-x64
106b4d258a8d...1a.exe
windows10-2004-x64
1074c99e0dfd...42.exe
windows10-2004-x64
107e6bab9491...d0.exe
windows10-2004-x64
80af2b3540...7e.exe
windows10-2004-x64
10a96b277202...ca.exe
windows10-2004-x64
10c1237a6a46...5b.exe
windows10-2004-x64
7d7fde0f5ef...97.exe
windows10-2004-x64
10dc220ed080...4e.exe
windows10-2004-x64
10e5e7bb0a7c...4a.exe
windows10-2004-x64
10e91c8d8104...e0.exe
windows10-2004-x64
10f3b6442113...3b.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
0697314d1d15813c538133353196a25ddf09e9340585e2de0be061757a02bea5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f998493b83f94488301c2a7f85ec4ad445820110ece601aee7e9d15a5ae5179.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
21e19370941ed45f65950d345652c8fe76f4f409b0bbb8261c579fb219042338.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2800d64eb3bc5b7c1f807e9baaf76c469f1d63f07cc116fb310c5c866087d931.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
3d64fae31acb5d4e6e0319606608e94d2b3a017279c295dba43ce4d28aab53d7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
652a4e2d36de8360e61d407c228b3eb8948cafa60881c208bbd568afd7222f35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
74c99e0dfdc0750268c34c3d63288e0bea52796a82c9b157a495fbe2608d4942.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80af2b3540716fa5dcd664b7f7ed120e1c1aa575c2fc1e1b6ee5df1723f2ab7e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
c1237a6a46458518390f044aae909d7b4e395ae64c6bb1db16e0cbe581f8d65b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d7fde0f5efb7f555528ff1c98946e36088ec7396d07c4fd0a577c6b49c4bcd97.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
dc220ed080f58ca4a078f8ea2a3ba2d42611f3da8514d41359c39eae805b1c4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe
Resource
win10v2004-20240426-en
General
-
Target
e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe
-
Size
648KB
-
MD5
c12139634f017d2d2c93952feebda554
-
SHA1
34d49019576082964f1d79b2cb8fa2f1298f1c29
-
SHA256
e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a
-
SHA512
85480633f93547b3ac6bf0b0971b42d41ef30bc4fda2eb1f91b8459e371d7705008fe168f63ba8eb11c5ce61cff484faa6200b823022183c39c10bbbf148b38f
-
SSDEEP
12288:6Mr/y90MJQl5BK7ra5tpf0e7FlSBhobizWQG+UhZ+wGBEAb9ot02QH4xk:NyWl5BMa5/tRitiQG+UhQvEAGtDgd
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral15/memory/2568-14-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral15/memory/2568-18-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral15/memory/2568-16-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral15/memory/2568-15-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral15/files/0x000700000002343e-20.dat family_redline behavioral15/memory/2248-22-0x0000000000D10000-0x0000000000D4E000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 3236 Jm5AD1vQ.exe 392 1OF70sw1.exe 2248 2jw288EV.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Jm5AD1vQ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 392 set thread context of 2568 392 1OF70sw1.exe 86 -
Program crash 2 IoCs
pid pid_target Process procid_target 1496 392 WerFault.exe 83 4688 2568 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3236 4528 e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe 82 PID 4528 wrote to memory of 3236 4528 e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe 82 PID 4528 wrote to memory of 3236 4528 e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe 82 PID 3236 wrote to memory of 392 3236 Jm5AD1vQ.exe 83 PID 3236 wrote to memory of 392 3236 Jm5AD1vQ.exe 83 PID 3236 wrote to memory of 392 3236 Jm5AD1vQ.exe 83 PID 392 wrote to memory of 4700 392 1OF70sw1.exe 84 PID 392 wrote to memory of 4700 392 1OF70sw1.exe 84 PID 392 wrote to memory of 4700 392 1OF70sw1.exe 84 PID 392 wrote to memory of 1272 392 1OF70sw1.exe 85 PID 392 wrote to memory of 1272 392 1OF70sw1.exe 85 PID 392 wrote to memory of 1272 392 1OF70sw1.exe 85 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 392 wrote to memory of 2568 392 1OF70sw1.exe 86 PID 3236 wrote to memory of 2248 3236 Jm5AD1vQ.exe 94 PID 3236 wrote to memory of 2248 3236 Jm5AD1vQ.exe 94 PID 3236 wrote to memory of 2248 3236 Jm5AD1vQ.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe"C:\Users\Admin\AppData\Local\Temp\e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jm5AD1vQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jm5AD1vQ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1OF70sw1.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1OF70sw1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 5405⤵
- Program crash
PID:4688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 6124⤵
- Program crash
PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2jw288EV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2jw288EV.exe3⤵
- Executes dropped EXE
PID:2248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 392 -ip 3921⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2568 -ip 25681⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD5bca9c7b71ead7fdeac218edf4f3fab4f
SHA18209879f1df23e99506acb591142cc2ef2d07bc3
SHA25643916853307921a44b9bcbefcc2890ade99cddc949bd548070f7bdf60832f48c
SHA512fd6a8ca472d2a69a6a5bb83fad33fa672ba2aaf75710e471042566337ea31abd0b5f31257bf9ee954c58962a37bcb40245a669e48dd9d3f8b2dc235213277196
-
Filesize
449KB
MD546c07b6d1b3acddad8d1950c6bd97e3e
SHA1b6d22845e2970215807bcaaf0fbd214d6dc03823
SHA25605a3779eb239d2829b65153440efeb694599a2847cd1944932450db46be8b0de
SHA512f7b619451892c0274749f7732e0427048b04423602d13fb59bfb6b88e1797e1ed8fefebe7bcdf968a7927ab46b219f318742401c64c1d00b12276cf8c9b7d101
-
Filesize
221KB
MD5091ca9376b4690e7926da147c97b54d9
SHA13123d1df94c0e9c29f07ddbf4d5e8833b9eef48e
SHA2568a05206e08291da87e64198c77450883d1953a5350a30c09699e115f8d07feaa
SHA51265258bb587ae16cd2b90d029e67f2652538cac5c5f6e52e59f74e7845bcbc9b85f15fefd2fe97e490989472004cbf751482c06d8a93ee3ba7bdcf0b958c21aa6