Overview
overview
10Static
static
3131b47af99...32.exe
windows10-2004-x64
10227ab56ef5...eb.exe
windows10-2004-x64
104537f51b0d...4c.exe
windows10-2004-x64
104852dcede8...5b.exe
windows7-x64
104852dcede8...5b.exe
windows10-2004-x64
104d68d381e4...34.exe
windows10-2004-x64
1062d27d23e1...d0.exe
windows10-2004-x64
106f4e5c3b3a...2b.exe
windows10-2004-x64
10775b7a0479...3d.exe
windows10-2004-x64
1080a8dab579...f7.exe
windows10-2004-x64
10a28852a355...af.exe
windows10-2004-x64
7d02a87f385...3a.exe
windows10-2004-x64
10d0c1074be1...1f.exe
windows10-2004-x64
10d427832084...e1.exe
windows10-2004-x64
10d53f5a64de...d1.exe
windows10-2004-x64
10d62198c81d...0d.exe
windows10-2004-x64
10dd0f820c33...a3.exe
windows10-2004-x64
10e3c377dc6b...f7.exe
windows10-2004-x64
10e9172c1691...86.exe
windows10-2004-x64
10f6c86e8cbc...da.exe
windows10-2004-x64
10fbd8d72f7e...0c.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c.exe
Resource
win10v2004-20240508-en
General
-
Target
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
-
Size
930KB
-
MD5
0cfe607a0e71e8e8185964b116396f08
-
SHA1
67406c6194bd8455a7f7112787cef8ecfc17d060
-
SHA256
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432
-
SHA512
1e3bf90ce8060d336f4eb45e920c6d6b544fbf3eb70cbe5a3f15d1dac8c385fca16409aaedf2fe6d72bd8e1a144d61c21ee3ef7dec7c21d79f2cbb6244c3d049
-
SSDEEP
24576:iytg+WfHZn2cMrrPTotPR47e2EmHTsjF7k6:J8fHZ2bdilNk
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral1/memory/1216-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/1216-29-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/1216-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023401-33.dat family_redline behavioral1/memory/4412-35-0x0000000000DA0000-0x0000000000DD0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 4544 x4885474.exe 3636 x3815247.exe 1888 x5031597.exe 2956 g8385831.exe 4412 h3469781.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4885474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3815247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5031597.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2956 set thread context of 1216 2956 g8385831.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 2684 2956 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 644 wrote to memory of 4544 644 131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe 83 PID 644 wrote to memory of 4544 644 131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe 83 PID 644 wrote to memory of 4544 644 131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe 83 PID 4544 wrote to memory of 3636 4544 x4885474.exe 84 PID 4544 wrote to memory of 3636 4544 x4885474.exe 84 PID 4544 wrote to memory of 3636 4544 x4885474.exe 84 PID 3636 wrote to memory of 1888 3636 x3815247.exe 85 PID 3636 wrote to memory of 1888 3636 x3815247.exe 85 PID 3636 wrote to memory of 1888 3636 x3815247.exe 85 PID 1888 wrote to memory of 2956 1888 x5031597.exe 86 PID 1888 wrote to memory of 2956 1888 x5031597.exe 86 PID 1888 wrote to memory of 2956 1888 x5031597.exe 86 PID 2956 wrote to memory of 4304 2956 g8385831.exe 89 PID 2956 wrote to memory of 4304 2956 g8385831.exe 89 PID 2956 wrote to memory of 4304 2956 g8385831.exe 89 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 2956 wrote to memory of 1216 2956 g8385831.exe 90 PID 1888 wrote to memory of 4412 1888 x5031597.exe 95 PID 1888 wrote to memory of 4412 1888 x5031597.exe 95 PID 1888 wrote to memory of 4412 1888 x5031597.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe"C:\Users\Admin\AppData\Local\Temp\131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4885474.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4885474.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3815247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3815247.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5031597.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5031597.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8385831.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8385831.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 5886⤵
- Program crash
PID:2684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3469781.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3469781.exe5⤵
- Executes dropped EXE
PID:4412
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2956 -ip 29561⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5be200f6e1cbeeef4aad5688a85e4bac1
SHA1f16c641000c9fee24f6246581a06abba88bb7929
SHA256d53dccdf974af097276df989f4b782c97c04f21615be89d04329d64deddc1f50
SHA512af2d5cf8912b3b205315bac5ab108ba483730c4f58c2d879e68b8c1ce4a44d2fe66778f1504d015bc77f524867a4817be0c61b7e788edc81114c30e9fb2b8d9f
-
Filesize
557KB
MD5d074331463985aea471350cee1fe1031
SHA1bc2632a81a6427f35329ce84f81678ca213b146e
SHA25688dd13404fab17b32994690e7fc7eeb4d35643200f172d2234fcc6461ce1c441
SHA512eed55d07aacceb1f2892359e48c5be5f01ab815cf97026c25104004118822ce8a1f33257b225d48dab36c2b3043580f946f327eedcd6f994724e3e988fdc42f7
-
Filesize
391KB
MD5c9056cbf620b931ba2cad390a1244790
SHA185ee5c7f579f1075f709bc4c119b519a005f9a09
SHA256e102043d37dd318e441f0517798befd1207f3962a9294dfecddad2dde03bb4d3
SHA5125bbfc29878e4b8a9757a9e03b2b003b2515d2a3c1a13e9a3a4522bab384b5084095ddb2dfc6a4d28bf326a64b642c6ce1a2d0fbfe71f937b3c4d2883cbffe7ff
-
Filesize
364KB
MD57ffdfae73d61cbb3489e5fbc9ea3cfc9
SHA19bc6f0e00b730639dec6d6d81d5a46f33ca30de1
SHA256c9d63d7ee133732b8d3b3de7d35aa6ff211abd0205dfb55ae4d91cc89109b11a
SHA512785538bb34d8d8707885c0a29405c2eb1dd9ab5b89565306b432d014447767ce07cbdfc4e5fa64ed85b944d1405704ffc5b4a5c3d9500ffeb9090abb543bd8fa
-
Filesize
174KB
MD5c2c9494497cd0393f8f80d185df87c29
SHA1e1c7e65be0cb20fcd3118030131395027c93a690
SHA256b35bc4db20f68856bbed0e5457e46966e6a16d2a42eb462383d7894ce1c3037b
SHA512cc928feb4c1e00b99be414dd491b86a246fcf594fa3ffe56e2c610a37a971e66052c4850ff41d31e0e9b45811b7345ee836454ebdeb62ce057b5ac8f86e77a73