Overview
overview
10Static
static
3131b47af99...32.exe
windows10-2004-x64
10227ab56ef5...eb.exe
windows10-2004-x64
104537f51b0d...4c.exe
windows10-2004-x64
104852dcede8...5b.exe
windows7-x64
104852dcede8...5b.exe
windows10-2004-x64
104d68d381e4...34.exe
windows10-2004-x64
1062d27d23e1...d0.exe
windows10-2004-x64
106f4e5c3b3a...2b.exe
windows10-2004-x64
10775b7a0479...3d.exe
windows10-2004-x64
1080a8dab579...f7.exe
windows10-2004-x64
10a28852a355...af.exe
windows10-2004-x64
7d02a87f385...3a.exe
windows10-2004-x64
10d0c1074be1...1f.exe
windows10-2004-x64
10d427832084...e1.exe
windows10-2004-x64
10d53f5a64de...d1.exe
windows10-2004-x64
10d62198c81d...0d.exe
windows10-2004-x64
10dd0f820c33...a3.exe
windows10-2004-x64
10e3c377dc6b...f7.exe
windows10-2004-x64
10e9172c1691...86.exe
windows10-2004-x64
10f6c86e8cbc...da.exe
windows10-2004-x64
10fbd8d72f7e...0c.exe
windows10-2004-x64
7Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c.exe
Resource
win10v2004-20240508-en
General
-
Target
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
-
Size
1.1MB
-
MD5
157293e9ec48c365745959b8300b17e1
-
SHA1
6e47a29b6f96c9a5f18dd25afc2d8e2a17792dc8
-
SHA256
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3
-
SHA512
922146ea84fb7fae01c153329ceba4e265db7cfde77c38f3199c8d09c243a0ea12807297691f6542581c8e5b74aaa4e268c20d6d4b65639313364815fcb259ad
-
SSDEEP
24576:HyMyx7uQwJpYPGJiYh2uUT0IG+HuZZx40dJcZv3Ph/KOSyUAPZ4KX8P:SV7uPa8ignrMHuZ0sOfP4yNX8
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral17/memory/4760-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral17/memory/4760-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral17/memory/4760-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2WY025Nb.exe family_redline behavioral17/memory/3380-42-0x0000000000FB0000-0x0000000000FEE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
CC9VB2nT.exeNg8oS5Lx.exeMD6zo5kq.exejB8am3Mf.exe1QD67JK7.exe2WY025Nb.exepid process 3812 CC9VB2nT.exe 2700 Ng8oS5Lx.exe 2432 MD6zo5kq.exe 868 jB8am3Mf.exe 5072 1QD67JK7.exe 3380 2WY025Nb.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exeCC9VB2nT.exeNg8oS5Lx.exeMD6zo5kq.exejB8am3Mf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" CC9VB2nT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ng8oS5Lx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" MD6zo5kq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" jB8am3Mf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1QD67JK7.exedescription pid process target process PID 5072 set thread context of 4760 5072 1QD67JK7.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1868 5072 WerFault.exe 1QD67JK7.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exeCC9VB2nT.exeNg8oS5Lx.exeMD6zo5kq.exejB8am3Mf.exe1QD67JK7.exedescription pid process target process PID 536 wrote to memory of 3812 536 dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe CC9VB2nT.exe PID 536 wrote to memory of 3812 536 dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe CC9VB2nT.exe PID 536 wrote to memory of 3812 536 dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe CC9VB2nT.exe PID 3812 wrote to memory of 2700 3812 CC9VB2nT.exe Ng8oS5Lx.exe PID 3812 wrote to memory of 2700 3812 CC9VB2nT.exe Ng8oS5Lx.exe PID 3812 wrote to memory of 2700 3812 CC9VB2nT.exe Ng8oS5Lx.exe PID 2700 wrote to memory of 2432 2700 Ng8oS5Lx.exe MD6zo5kq.exe PID 2700 wrote to memory of 2432 2700 Ng8oS5Lx.exe MD6zo5kq.exe PID 2700 wrote to memory of 2432 2700 Ng8oS5Lx.exe MD6zo5kq.exe PID 2432 wrote to memory of 868 2432 MD6zo5kq.exe jB8am3Mf.exe PID 2432 wrote to memory of 868 2432 MD6zo5kq.exe jB8am3Mf.exe PID 2432 wrote to memory of 868 2432 MD6zo5kq.exe jB8am3Mf.exe PID 868 wrote to memory of 5072 868 jB8am3Mf.exe 1QD67JK7.exe PID 868 wrote to memory of 5072 868 jB8am3Mf.exe 1QD67JK7.exe PID 868 wrote to memory of 5072 868 jB8am3Mf.exe 1QD67JK7.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 5072 wrote to memory of 4760 5072 1QD67JK7.exe AppLaunch.exe PID 868 wrote to memory of 3380 868 jB8am3Mf.exe 2WY025Nb.exe PID 868 wrote to memory of 3380 868 jB8am3Mf.exe 2WY025Nb.exe PID 868 wrote to memory of 3380 868 jB8am3Mf.exe 2WY025Nb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe"C:\Users\Admin\AppData\Local\Temp\dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CC9VB2nT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CC9VB2nT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ng8oS5Lx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ng8oS5Lx.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\MD6zo5kq.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\MD6zo5kq.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jB8am3Mf.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jB8am3Mf.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1QD67JK7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1QD67JK7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 5567⤵
- Program crash
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2WY025Nb.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2WY025Nb.exe6⤵
- Executes dropped EXE
PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5072 -ip 50721⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1008KB
MD518cfeea9f9553780502e6f2614324a6b
SHA1a8aabeeb53e2a6e70e157c7a8ac5239259c1cb08
SHA256d4d05b7d9006552621d4b224e56de449cb5990f1a5c3e01cbe1cce9c0e294c1d
SHA512bac916489ceb57dde51d5a199c1e016a8a8f5bca01f3373d74b5119ef44871f4523cad6a8ef97cede79f40b0b3daf0dc3e366530e88ce368e16a5c0e3b7d056f
-
Filesize
819KB
MD57cfd257b34fae866ba8aaa6df8b08c12
SHA1cda2df546de510f73a7d41977e0725e4f3180ac3
SHA256fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c
SHA5122a2e2a75b1f149d9304fe66690e7a2a712b17af9a6da0ede0870e137bad74243392fcfcfc564e79055913990976da8895bba3bb8755323064876e5f5e4dc125c
-
Filesize
583KB
MD5e40f23ca8e94f427a2d4bddbc321d459
SHA15d2e9fa12e9a42a6ec42e8e25ae02a35d8dd7e14
SHA256080679bb8f09d217d70a3146daef22e344337c084820a08aa209b16d074cff51
SHA512026b686d62752019f034a0210cfd853aa1f0b0ba5149d3760178e57d01877366af53087f2f6883bedc7fbf0573749a0114b087d6c7f54403747ab022449c372b
-
Filesize
383KB
MD50b3f96f0c65e134b7112622fa24a8b4b
SHA1ec55c989b3393a5412ca2776e50520606ddec598
SHA256300fb09db220962736eb5f9ba9ebd5fe9701205513a6860b275c9dee5b07374d
SHA51254465e763ad4b99ea0507bf743ec6710a9daef74ad5547f797dc847d788f186c69da7723dc03262fbb801b2b31704c0a718dfcf6111e375b477078981c561e3e
-
Filesize
298KB
MD54a071cc30292b81eb2350b5027cfde8f
SHA155825da08668fd0a1e197b75e6e42c7bbd99694f
SHA256474f604ad90cb29cce321f4977f03a8144e99d8419e351de97e981e0db76d0a3
SHA5122ab61f576810172f7671e7ed16c0f08e9802f16df843d543cf6ef600372ac715888b2822837766d8af8f61b7854acbef9d41b828500eb9d62184c496dc21e78a
-
Filesize
222KB
MD51cce1d4bf0256e3c39044d2d021fa5a3
SHA1ac506fd1f0d7688219ae5fd4076c376fab032bd4
SHA25650c03ebc296eb9521ce2c98efd21962ced67f66d1967828920856085b5ed112f
SHA51291d94ce6cbd86068fd1e3b3c4665ab9bba242126422a292af140c6f649f82c4275c63bbd61a4b5c67b559ba82dea146c1998a64c434c905f78c328e53c756a70