Overview
overview
10Static
static
3131b47af99...32.exe
windows10-2004-x64
10227ab56ef5...eb.exe
windows10-2004-x64
104537f51b0d...4c.exe
windows10-2004-x64
104852dcede8...5b.exe
windows7-x64
104852dcede8...5b.exe
windows10-2004-x64
104d68d381e4...34.exe
windows10-2004-x64
1062d27d23e1...d0.exe
windows10-2004-x64
106f4e5c3b3a...2b.exe
windows10-2004-x64
10775b7a0479...3d.exe
windows10-2004-x64
1080a8dab579...f7.exe
windows10-2004-x64
10a28852a355...af.exe
windows10-2004-x64
7d02a87f385...3a.exe
windows10-2004-x64
10d0c1074be1...1f.exe
windows10-2004-x64
10d427832084...e1.exe
windows10-2004-x64
10d53f5a64de...d1.exe
windows10-2004-x64
10d62198c81d...0d.exe
windows10-2004-x64
10dd0f820c33...a3.exe
windows10-2004-x64
10e3c377dc6b...f7.exe
windows10-2004-x64
10e9172c1691...86.exe
windows10-2004-x64
10f6c86e8cbc...da.exe
windows10-2004-x64
10fbd8d72f7e...0c.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c.exe
Resource
win10v2004-20240508-en
General
-
Target
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
-
Size
1.2MB
-
MD5
56a2f2d0890ff16eb044b0a5778e7867
-
SHA1
72ba83d1c6ed4ffaf733b1568d0d6398dbec43fc
-
SHA256
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834
-
SHA512
115bd5b7617d63697c0de243e1e3b6544708d50c5a6d5c160765b838992ceb73b73f19016135e7fd1c0e2d70200c5e769e162952bda324a651d34f1eff72c9a8
-
SSDEEP
24576:dy2i20A1nLmftA2TpmFJeqRzEhzasUml7gGt0ssGXyQl4Fj:42eA1WbTp8RKesUIzl4
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral6/files/0x000800000002344d-33.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral6/files/0x000700000002344e-37.dat family_redline behavioral6/memory/4020-38-0x0000000000940000-0x000000000097E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2088 WK5Yf1iK.exe 4008 eL7Mc1rX.exe 2544 hC7yA0mj.exe 1604 Od7MZ3XC.exe 4580 1Fe38NP6.exe 4020 2Vk043xR.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" WK5Yf1iK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" eL7Mc1rX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hC7yA0mj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Od7MZ3XC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2088 1836 4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe 82 PID 1836 wrote to memory of 2088 1836 4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe 82 PID 1836 wrote to memory of 2088 1836 4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe 82 PID 2088 wrote to memory of 4008 2088 WK5Yf1iK.exe 83 PID 2088 wrote to memory of 4008 2088 WK5Yf1iK.exe 83 PID 2088 wrote to memory of 4008 2088 WK5Yf1iK.exe 83 PID 4008 wrote to memory of 2544 4008 eL7Mc1rX.exe 84 PID 4008 wrote to memory of 2544 4008 eL7Mc1rX.exe 84 PID 4008 wrote to memory of 2544 4008 eL7Mc1rX.exe 84 PID 2544 wrote to memory of 1604 2544 hC7yA0mj.exe 85 PID 2544 wrote to memory of 1604 2544 hC7yA0mj.exe 85 PID 2544 wrote to memory of 1604 2544 hC7yA0mj.exe 85 PID 1604 wrote to memory of 4580 1604 Od7MZ3XC.exe 86 PID 1604 wrote to memory of 4580 1604 Od7MZ3XC.exe 86 PID 1604 wrote to memory of 4580 1604 Od7MZ3XC.exe 86 PID 1604 wrote to memory of 4020 1604 Od7MZ3XC.exe 88 PID 1604 wrote to memory of 4020 1604 Od7MZ3XC.exe 88 PID 1604 wrote to memory of 4020 1604 Od7MZ3XC.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe"C:\Users\Admin\AppData\Local\Temp\4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WK5Yf1iK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WK5Yf1iK.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eL7Mc1rX.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eL7Mc1rX.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hC7yA0mj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hC7yA0mj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Od7MZ3XC.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Od7MZ3XC.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Fe38NP6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Fe38NP6.exe6⤵
- Executes dropped EXE
PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Vk043xR.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Vk043xR.exe6⤵
- Executes dropped EXE
PID:4020
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD516725fedfc49ba1be97e18220ba2c787
SHA1f86eea0028485bb788b36b0f245bb13dc84dfc7d
SHA2566a9700449887e1f244cc02eca06d0450a78ebb2b393f42b112baab24156e9dcf
SHA512e5cef759f1556ed977c6a9c01b1fb69832a09cbeb8795f7bb2b57c19ef25ed45ff949856b5aac9effbea7abdc6d3f857766a855ec0278c4daa3b6de192a092d9
-
Filesize
926KB
MD574ffdaf96c6c56e8fca4a0ff8e5c5399
SHA1942fc316546da9e2aff6f1cc89d8b23f656d53c1
SHA25670ec60a0f2a853bd91349181777c7f030f27abcee2daa6d831f20d7db6942874
SHA512b3ba49ac2ca6f873ecd609c3205d8b9ecd3a1fb4cf1835e610f49180046141c65773ba044b29b12b58d344359e9abd6282856a9ea5671416b9b01616f5030f3a
-
Filesize
514KB
MD5f8d8b6b88a03f0e0ff960b953a71fa4c
SHA18628f3cf550090ace33055c438770ed184658572
SHA25605091afc417e803179873e9dd77b4131c55254b69354a37bea9d3411dafc4a6a
SHA512f53f9c460dbea49b0eb878a82d3bb37ad70c1c0c92a279418626372ff02e9ac7406b6332ce486444381723288f8c92b5ffeeef0e54a5f6d8963de18573f386c4
-
Filesize
319KB
MD5af899db5291cf24333078a2175735cf5
SHA166561e7cc08c59ee086276bcc4e5808993cd592c
SHA2564173573dbcb601c1032c724129ce45c636ad0e5af7a3db7105d9a1688fa09e5e
SHA512405a905228a5bc90a3e907c7bc5ce04745877366adfd80eb577f6170fdcdbdb0a0e6134fbfeb34395c64d70f6ef4fd85acb7fd2cedf2976d727df806c713b50b
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e
-
Filesize
221KB
MD5b358391b15b41904af22b0302c89730f
SHA17bfe110ae187a202d4858cb78af17d15e1378333
SHA256e9a4fc1d7e5ff21dc8a3046fa93fcd77d9081b199ff1e63d22faa6d49a5d3017
SHA512fe45f58db5040c47acbe8f037881961c360614cd4637fb7dcebe936d1bd549585ada49382e72153167f74a6570521d85fba3d5777ed3a9cb98debde4d3a43ca4