Overview
overview
10Static
static
30697314d1d...a5.exe
windows10-2004-x64
100f998493b8...79.exe
windows10-2004-x64
1021e1937094...38.exe
windows10-2004-x64
102800d64eb3...31.exe
windows10-2004-x64
103d64fae31a...d7.exe
windows10-2004-x64
10652a4e2d36...35.exe
windows10-2004-x64
106b4d258a8d...1a.exe
windows10-2004-x64
1074c99e0dfd...42.exe
windows10-2004-x64
107e6bab9491...d0.exe
windows10-2004-x64
80af2b3540...7e.exe
windows10-2004-x64
10a96b277202...ca.exe
windows10-2004-x64
10c1237a6a46...5b.exe
windows10-2004-x64
7d7fde0f5ef...97.exe
windows10-2004-x64
10dc220ed080...4e.exe
windows10-2004-x64
10e5e7bb0a7c...4a.exe
windows10-2004-x64
10e91c8d8104...e0.exe
windows10-2004-x64
10f3b6442113...3b.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
0697314d1d15813c538133353196a25ddf09e9340585e2de0be061757a02bea5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f998493b83f94488301c2a7f85ec4ad445820110ece601aee7e9d15a5ae5179.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
21e19370941ed45f65950d345652c8fe76f4f409b0bbb8261c579fb219042338.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2800d64eb3bc5b7c1f807e9baaf76c469f1d63f07cc116fb310c5c866087d931.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
3d64fae31acb5d4e6e0319606608e94d2b3a017279c295dba43ce4d28aab53d7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
652a4e2d36de8360e61d407c228b3eb8948cafa60881c208bbd568afd7222f35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
74c99e0dfdc0750268c34c3d63288e0bea52796a82c9b157a495fbe2608d4942.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80af2b3540716fa5dcd664b7f7ed120e1c1aa575c2fc1e1b6ee5df1723f2ab7e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
c1237a6a46458518390f044aae909d7b4e395ae64c6bb1db16e0cbe581f8d65b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d7fde0f5efb7f555528ff1c98946e36088ec7396d07c4fd0a577c6b49c4bcd97.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
dc220ed080f58ca4a078f8ea2a3ba2d42611f3da8514d41359c39eae805b1c4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe
Resource
win10v2004-20240426-en
General
-
Target
6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe
-
Size
1.5MB
-
MD5
0c949673ce549079af032d4298d9e8cb
-
SHA1
d7a889d9434be7b5e55b6df4dec0905899b997ec
-
SHA256
6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a
-
SHA512
13264a8ff11b5beba5ebad1c854b81eef24f39c395056d049e98a473fd5c26fdaff64cb888419c13feb01eb7f1398a9f277d1c8bde3eeab3478354ec32d2fc10
-
SSDEEP
24576:6yjXmF5XP50jauubNHvtTAwYSd4utYYMDiRaF+9eXzrdG+gqD+MuyDA:By/WGHvGC4ufRuLrdtHu
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral7/memory/3884-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral7/memory/3884-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral7/memory/3884-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x0007000000023455-41.dat family_redline behavioral7/memory/2800-42-0x0000000000CB0000-0x0000000000CEE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3324 GW4Of4Qj.exe 1712 Qs0qz4VC.exe 2960 oh2nf7Xj.exe 1156 Qc6eV0si.exe 2320 1uA60dN5.exe 2800 2it326SR.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Qs0qz4VC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" oh2nf7Xj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Qc6eV0si.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" GW4Of4Qj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2320 set thread context of 3884 2320 1uA60dN5.exe 96 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4288 wrote to memory of 3324 4288 6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe 82 PID 4288 wrote to memory of 3324 4288 6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe 82 PID 4288 wrote to memory of 3324 4288 6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe 82 PID 3324 wrote to memory of 1712 3324 GW4Of4Qj.exe 83 PID 3324 wrote to memory of 1712 3324 GW4Of4Qj.exe 83 PID 3324 wrote to memory of 1712 3324 GW4Of4Qj.exe 83 PID 1712 wrote to memory of 2960 1712 Qs0qz4VC.exe 85 PID 1712 wrote to memory of 2960 1712 Qs0qz4VC.exe 85 PID 1712 wrote to memory of 2960 1712 Qs0qz4VC.exe 85 PID 2960 wrote to memory of 1156 2960 oh2nf7Xj.exe 87 PID 2960 wrote to memory of 1156 2960 oh2nf7Xj.exe 87 PID 2960 wrote to memory of 1156 2960 oh2nf7Xj.exe 87 PID 1156 wrote to memory of 2320 1156 Qc6eV0si.exe 88 PID 1156 wrote to memory of 2320 1156 Qc6eV0si.exe 88 PID 1156 wrote to memory of 2320 1156 Qc6eV0si.exe 88 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 2320 wrote to memory of 3884 2320 1uA60dN5.exe 96 PID 1156 wrote to memory of 2800 1156 Qc6eV0si.exe 97 PID 1156 wrote to memory of 2800 1156 Qc6eV0si.exe 97 PID 1156 wrote to memory of 2800 1156 Qc6eV0si.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe"C:\Users\Admin\AppData\Local\Temp\6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GW4Of4Qj.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GW4Of4Qj.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Qs0qz4VC.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Qs0qz4VC.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oh2nf7Xj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oh2nf7Xj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Qc6eV0si.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Qc6eV0si.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1uA60dN5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1uA60dN5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2it326SR.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2it326SR.exe6⤵
- Executes dropped EXE
PID:2800
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD55cd1c15634f3ca814a7a163198b19a49
SHA1cee053d0d284c29e75e58f4a96770de6b930ead8
SHA2565db7ea49635e67b752779b82d470b1ac38fe7204b7466f2d39322038e9443165
SHA512a144f71b8ff6fc4600f62e8043b6736fd060c0718f7e9718dda7cdfa50ac1d422f791d6b6770cde77c7ff9bc705d021541f4647c061dde6e6b1aa6e91be25524
-
Filesize
1.2MB
MD599c0b27fd66dcdcd347739bc3c8546a1
SHA1f75ad282003fea2f45b975715a4f571c4015a676
SHA2565935915479b3b12aa516ee214cf5df365ade22c5c01847f8cf9f021326b909d7
SHA512b29352835963b13abbd43175dd7eaf006263440e62dd2d99196f0d5e42f8d937970df8a27b3ac301626f7ad46984af687e48fb6fc45d3d6ef8ec7ab32eeab2dd
-
Filesize
776KB
MD54b97cdfd79057fd05d4351b54636a383
SHA1fa01aa6e9ac44187c0401cb36d7062b400bef981
SHA2568d9ad58d79d58fc29022f5180e3a0c362a94edaabd66d61357f10da81bc8b53f
SHA512405644bb480f9a0aa35c60cb67376a2a745313c1e5ff35478d132aead7f11a4d164797eb0fb19459f46628691561399d9f3444e91f47d482d2362d8d8c9c6410
-
Filesize
580KB
MD51ed4a413bf4ed424d684cef50c06c926
SHA1974aa7192a779d47b1318eee80f80fb5a5ac7738
SHA256dac235280a4191a8fd182307ed6240b8702f5188cbc7ab4a1dd7cb7d64f03950
SHA51219687109b9caa43c42a6b37a71940b663aa60057b80ca4bcc81764c352360443e55f852ba9b5100160acc3ed91acd140b0ae4db7321e9ccc2f7314ca0726692d
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc
-
Filesize
222KB
MD5667c7c0846f4ca4533b58ef2fee53175
SHA1f45d4e0c90ec169bb8fadc931cdd345ac407c915
SHA2562f0083f88911bcffe5db2e9f4587eb894c59ae18e2affb4037b5787928d19872
SHA512df229d6e0951c88874f427701c46354425f2721e845f0eceb343eececa9290fffa47d96f7d5de3384ee4ec16b679f595a3646ae74acbeb1233490ec5fa0f39e3