Overview
overview
10Static
static
3131b47af99...32.exe
windows10-2004-x64
10227ab56ef5...eb.exe
windows10-2004-x64
104537f51b0d...4c.exe
windows10-2004-x64
104852dcede8...5b.exe
windows7-x64
104852dcede8...5b.exe
windows10-2004-x64
104d68d381e4...34.exe
windows10-2004-x64
1062d27d23e1...d0.exe
windows10-2004-x64
106f4e5c3b3a...2b.exe
windows10-2004-x64
10775b7a0479...3d.exe
windows10-2004-x64
1080a8dab579...f7.exe
windows10-2004-x64
10a28852a355...af.exe
windows10-2004-x64
7d02a87f385...3a.exe
windows10-2004-x64
10d0c1074be1...1f.exe
windows10-2004-x64
10d427832084...e1.exe
windows10-2004-x64
10d53f5a64de...d1.exe
windows10-2004-x64
10d62198c81d...0d.exe
windows10-2004-x64
10dd0f820c33...a3.exe
windows10-2004-x64
10e3c377dc6b...f7.exe
windows10-2004-x64
10e9172c1691...86.exe
windows10-2004-x64
10f6c86e8cbc...da.exe
windows10-2004-x64
10fbd8d72f7e...0c.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c.exe
Resource
win10v2004-20240508-en
General
-
Target
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
-
Size
1008KB
-
MD5
100602fe3e9beff6fafb32f8be16a64d
-
SHA1
93941e2aae1f0f717c72cb708f41598b24908df8
-
SHA256
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586
-
SHA512
db129a290ceb46fc264dabd3dca635860678bf936ae69813e7ab4a2efcab608a38689bb18b4219e3c19f264baa0bcc5997811a0a6a8181d7754a5ad28c310839
-
SSDEEP
24576:jyRyvg2jeg6TBTHnRO2erkrkluTI7hLdyVS:2G36TBTHrikhTKa
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral19/memory/2348-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral19/memory/2348-31-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral19/memory/2348-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023436-33.dat family_redline behavioral19/memory/3664-35-0x00000000007D0000-0x000000000080E000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 668 uh8Du2vY.exe 3152 qT0eO1bT.exe 1728 FG1XJ1YF.exe 3236 1dC74YX1.exe 3664 2sQ117lJ.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" FG1XJ1YF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" uh8Du2vY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" qT0eO1bT.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3236 set thread context of 2348 3236 1dC74YX1.exe 101 -
Program crash 1 IoCs
pid pid_target Process procid_target 2336 3236 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 528 wrote to memory of 668 528 e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe 83 PID 528 wrote to memory of 668 528 e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe 83 PID 528 wrote to memory of 668 528 e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe 83 PID 668 wrote to memory of 3152 668 uh8Du2vY.exe 84 PID 668 wrote to memory of 3152 668 uh8Du2vY.exe 84 PID 668 wrote to memory of 3152 668 uh8Du2vY.exe 84 PID 3152 wrote to memory of 1728 3152 qT0eO1bT.exe 85 PID 3152 wrote to memory of 1728 3152 qT0eO1bT.exe 85 PID 3152 wrote to memory of 1728 3152 qT0eO1bT.exe 85 PID 1728 wrote to memory of 3236 1728 FG1XJ1YF.exe 87 PID 1728 wrote to memory of 3236 1728 FG1XJ1YF.exe 87 PID 1728 wrote to memory of 3236 1728 FG1XJ1YF.exe 87 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 3236 wrote to memory of 2348 3236 1dC74YX1.exe 101 PID 1728 wrote to memory of 3664 1728 FG1XJ1YF.exe 105 PID 1728 wrote to memory of 3664 1728 FG1XJ1YF.exe 105 PID 1728 wrote to memory of 3664 1728 FG1XJ1YF.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe"C:\Users\Admin\AppData\Local\Temp\e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uh8Du2vY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uh8Du2vY.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qT0eO1bT.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qT0eO1bT.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FG1XJ1YF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FG1XJ1YF.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1dC74YX1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1dC74YX1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 5566⤵
- Program crash
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2sQ117lJ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2sQ117lJ.exe5⤵
- Executes dropped EXE
PID:3664
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3236 -ip 32361⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
819KB
MD5e13f774a4cb371aaaa0c2302ac79994d
SHA121824f4eb32e4f1d2b65c0aa877f42c96e5f2e41
SHA256cf1fbd44626e403e64c787a8199e4e5e2f1784d9d2375ef8167e7a2eb845ffda
SHA5129b358526ac569efddbca425a1122f7ba08f702a3ae918ad4a41d14aa4bf266f0ab960c455e878e51e1ae254ef61f493a4f7f364624aa1d20b4eb12ac24b02327
-
Filesize
584KB
MD5e4403408fd53fd20a5d933cce9d53604
SHA196823b76363496d4d2e5f36a65da35c055c5a804
SHA25673a72e1eef3f2ed3174b908e547048c0da4b337bcd6872d691773fcf040c0984
SHA5122ecda542042ed3472b86098082e8fae7cc1d4fe8d98d307d27b70e732861250811cd92fce4dd283a92e4011b579571309852c27f82d7ca6f8573ce961e38aae1
-
Filesize
383KB
MD5be39646ff930e80702b9c1d6ebb84fc1
SHA19ce7885c18741f5b4eefcf5b2fc88d29f9ca0420
SHA2561c19e9b907b3aa307e2fc2ae9905e782970ccf81e14123b55c004073f1b164e3
SHA5120953d240adbb48569bd835ef4e1b35d75651469bab0441a356fc3bd28e8989fee6bd558881986fa4ea002f9c90ffeda1247e9022c06c89ce5205badd10de36dd
-
Filesize
298KB
MD55a68175e7359ff82a80bd6712969f9cf
SHA19e6ea0c2a1dbd290c3ccdbb82ead4e81737c8ead
SHA256b0f917fd6741a333629752b521fd212ad13612b40683db20ed651f3da4a4bf23
SHA512f63dd74156cb8cbe4a781edf01b889b61ffc2c6d33971f3bdb673934a7ab7ad1c1f943c8cd7208a125c6aec62ecd2fc57d53eb6dace71e63dbd5fd102011d58b
-
Filesize
222KB
MD5681fe6d6c47f8871611f29f573a7c411
SHA18ff239c9bcffd31c610de43c1e71dd8f16814064
SHA2569e256a518ab2e7c9dcca3a18bae1ca1eda33dcfbd91ff20d604f60c6c95fa813
SHA512abfcc1461d598aba3f228ce7c8d9f34486f70e956d0a9cdc3e384ddb1654af703b53bc616c42e4aea22e787a93ccb0f398b3695f60d9d117788bbed2e41205b3