Overview
overview
10Static
static
3131b47af99...32.exe
windows10-2004-x64
10227ab56ef5...eb.exe
windows10-2004-x64
104537f51b0d...4c.exe
windows10-2004-x64
104852dcede8...5b.exe
windows7-x64
104852dcede8...5b.exe
windows10-2004-x64
104d68d381e4...34.exe
windows10-2004-x64
1062d27d23e1...d0.exe
windows10-2004-x64
106f4e5c3b3a...2b.exe
windows10-2004-x64
10775b7a0479...3d.exe
windows10-2004-x64
1080a8dab579...f7.exe
windows10-2004-x64
10a28852a355...af.exe
windows10-2004-x64
7d02a87f385...3a.exe
windows10-2004-x64
10d0c1074be1...1f.exe
windows10-2004-x64
10d427832084...e1.exe
windows10-2004-x64
10d53f5a64de...d1.exe
windows10-2004-x64
10d62198c81d...0d.exe
windows10-2004-x64
10dd0f820c33...a3.exe
windows10-2004-x64
10e3c377dc6b...f7.exe
windows10-2004-x64
10e9172c1691...86.exe
windows10-2004-x64
10f6c86e8cbc...da.exe
windows10-2004-x64
10fbd8d72f7e...0c.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c.exe
Resource
win10v2004-20240508-en
General
-
Target
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
-
Size
839KB
-
MD5
ff24fae8745206c4269b6c6fa50b1639
-
SHA1
3528935a1c923cf79eb507bdfe79e0af92dd7f79
-
SHA256
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d
-
SHA512
46bd86945bf49339fb278337a13e0a52939673a4cd352c1dd2eac551e12bd56e12a50faf7f62da3d935b161ae9d8c6779ffc7130923d735c05f6a750547a5bda
-
SSDEEP
24576:QyObegToqBD6bfxbOqgsmK//21X7gZYQeQAw:XhgHD6bfxbOgm2l3
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral16/memory/2084-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral16/memory/2084-32-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral16/memory/2084-30-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral16/memory/636-40-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral16/memory/2964-21-0x00000000025B0000-0x00000000025D0000-memory.dmp net_reactor behavioral16/memory/2964-23-0x00000000050A0000-0x00000000050BE000-memory.dmp net_reactor -
Executes dropped EXE 6 IoCs
Processes:
Jx7dR05.exesi5KZ07.exe1mu02gG0.exe2OX2884.exe3Lu07EY.exe4wr717kr.exepid process 2488 Jx7dR05.exe 384 si5KZ07.exe 2964 1mu02gG0.exe 1548 2OX2884.exe 4588 3Lu07EY.exe 4224 4wr717kr.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exeJx7dR05.exesi5KZ07.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Jx7dR05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" si5KZ07.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2OX2884.exe3Lu07EY.exe4wr717kr.exedescription pid process target process PID 1548 set thread context of 2084 1548 2OX2884.exe AppLaunch.exe PID 4588 set thread context of 3564 4588 3Lu07EY.exe AppLaunch.exe PID 4224 set thread context of 636 4224 4wr717kr.exe AppLaunch.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3324 1548 WerFault.exe 2OX2884.exe 1916 4588 WerFault.exe 3Lu07EY.exe 3040 4224 WerFault.exe 4wr717kr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1mu02gG0.exedescription pid process Token: SeDebugPrivilege 2964 1mu02gG0.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exeJx7dR05.exesi5KZ07.exe2OX2884.exe3Lu07EY.exe4wr717kr.exedescription pid process target process PID 1508 wrote to memory of 2488 1508 d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe Jx7dR05.exe PID 1508 wrote to memory of 2488 1508 d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe Jx7dR05.exe PID 1508 wrote to memory of 2488 1508 d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe Jx7dR05.exe PID 2488 wrote to memory of 384 2488 Jx7dR05.exe si5KZ07.exe PID 2488 wrote to memory of 384 2488 Jx7dR05.exe si5KZ07.exe PID 2488 wrote to memory of 384 2488 Jx7dR05.exe si5KZ07.exe PID 384 wrote to memory of 2964 384 si5KZ07.exe 1mu02gG0.exe PID 384 wrote to memory of 2964 384 si5KZ07.exe 1mu02gG0.exe PID 384 wrote to memory of 2964 384 si5KZ07.exe 1mu02gG0.exe PID 384 wrote to memory of 1548 384 si5KZ07.exe 2OX2884.exe PID 384 wrote to memory of 1548 384 si5KZ07.exe 2OX2884.exe PID 384 wrote to memory of 1548 384 si5KZ07.exe 2OX2884.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 1548 wrote to memory of 2084 1548 2OX2884.exe AppLaunch.exe PID 2488 wrote to memory of 4588 2488 Jx7dR05.exe 3Lu07EY.exe PID 2488 wrote to memory of 4588 2488 Jx7dR05.exe 3Lu07EY.exe PID 2488 wrote to memory of 4588 2488 Jx7dR05.exe 3Lu07EY.exe PID 4588 wrote to memory of 3564 4588 3Lu07EY.exe AppLaunch.exe PID 4588 wrote to memory of 3564 4588 3Lu07EY.exe AppLaunch.exe PID 4588 wrote to memory of 3564 4588 3Lu07EY.exe AppLaunch.exe PID 4588 wrote to memory of 3564 4588 3Lu07EY.exe AppLaunch.exe PID 4588 wrote to memory of 3564 4588 3Lu07EY.exe AppLaunch.exe PID 4588 wrote to memory of 3564 4588 3Lu07EY.exe AppLaunch.exe PID 1508 wrote to memory of 4224 1508 d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe 4wr717kr.exe PID 1508 wrote to memory of 4224 1508 d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe 4wr717kr.exe PID 1508 wrote to memory of 4224 1508 d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe 4wr717kr.exe PID 4224 wrote to memory of 636 4224 4wr717kr.exe AppLaunch.exe PID 4224 wrote to memory of 636 4224 4wr717kr.exe AppLaunch.exe PID 4224 wrote to memory of 636 4224 4wr717kr.exe AppLaunch.exe PID 4224 wrote to memory of 636 4224 4wr717kr.exe AppLaunch.exe PID 4224 wrote to memory of 636 4224 4wr717kr.exe AppLaunch.exe PID 4224 wrote to memory of 636 4224 4wr717kr.exe AppLaunch.exe PID 4224 wrote to memory of 636 4224 4wr717kr.exe AppLaunch.exe PID 4224 wrote to memory of 636 4224 4wr717kr.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe"C:\Users\Admin\AppData\Local\Temp\d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jx7dR05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jx7dR05.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\si5KZ07.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\si5KZ07.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1mu02gG0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1mu02gG0.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2OX2884.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2OX2884.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 1525⤵
- Program crash
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Lu07EY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Lu07EY.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 6164⤵
- Program crash
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4wr717kr.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4wr717kr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 1483⤵
- Program crash
PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1548 -ip 15481⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4588 -ip 45881⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4224 -ip 42241⤵PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD50b15e3e1c8209f3f7d7c4e44c2aa238f
SHA121bef4ed4a8cf16884f3fc2ce8bd3827ec751c3a
SHA256c36b6cee46b96ac2d72e328f2f678f708453a51de1c175b6f5ad5eca899fa4fb
SHA5127e183f67cd6c117fcfb1eb472e6e7a77ba9a0817dbde1487f2c80bf5e05885bde2842428418b2d972e39a28e9a5d0a68161a996bca8502150142111a3b895e73
-
Filesize
605KB
MD51a05054a990150bff4ab5013ead71fe3
SHA18f803b1b92854df5e30e82000445121ed1ade5fa
SHA256d4a6ce621e37b52a0502934e8cc88d895a9ef0bb02e5a70c172fa9b712c8b805
SHA5124b3b20e8af6c8dbbac4e5cba35d3ab195ee27cab1d89389cb2fe5d5fba4e2e8ce329797c3ef03fca39ea689aaf9d7de4d30216408695f94e8e8fecf2ff0bd588
-
Filesize
145KB
MD5af5a39fa501e1fa61435e80f169b2c9f
SHA12b87ca8d6e43603c47e0ea3be6736c540c283abf
SHA256c820ef22dea01c865740e810b7bc6961b438ad5435420e7bd3f6840d609a5446
SHA512faa24942bb6ac3c04032a0a42be30c0741e9912ca4a16d52a429df04e2a85425fdbc29ee8aa654bf16b3d46e382deafe45b53120dbfc12a5fa7f47d27ec27d25
-
Filesize
421KB
MD5375c5ea54f3bdbfdcee491b25dc06d15
SHA1661c142637651b501c0e9bf979de3915726ea94b
SHA2566041ab8a20cbf9f1431afc955849e3562357f873bc9212f4f91700ee11590876
SHA512828dea20c1ee26071f2e784cc21b63e0f4c472e1912893f523a6be38b8fa480f271671ecb96e0acb5bde1436ba11020b255c5560288816490d3285531880b4a4
-
Filesize
188KB
MD5425e2a994509280a8c1e2812dfaad929
SHA14d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA2566f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0
-
Filesize
295KB
MD58393d3108b66e6b5861f618633647788
SHA1ce610b0c10df715f4a781614a58213b1b60bcbe5
SHA256fd7686f5574cf48913aa709c30afeedf1382d6bc507fa81928906119f96a2a96
SHA51208956b6a74ee1dab5879de3406642fa1a039884ef0016631c80c4bbb2eff4664462714a81cdcc173dc0d0a366aa8eafa336c93b2060df835b60b7310843fcc2c