Overview
overview
10Static
static
3131b47af99...32.exe
windows10-2004-x64
10227ab56ef5...eb.exe
windows10-2004-x64
104537f51b0d...4c.exe
windows10-2004-x64
104852dcede8...5b.exe
windows7-x64
104852dcede8...5b.exe
windows10-2004-x64
104d68d381e4...34.exe
windows10-2004-x64
1062d27d23e1...d0.exe
windows10-2004-x64
106f4e5c3b3a...2b.exe
windows10-2004-x64
10775b7a0479...3d.exe
windows10-2004-x64
1080a8dab579...f7.exe
windows10-2004-x64
10a28852a355...af.exe
windows10-2004-x64
7d02a87f385...3a.exe
windows10-2004-x64
10d0c1074be1...1f.exe
windows10-2004-x64
10d427832084...e1.exe
windows10-2004-x64
10d53f5a64de...d1.exe
windows10-2004-x64
10d62198c81d...0d.exe
windows10-2004-x64
10dd0f820c33...a3.exe
windows10-2004-x64
10e3c377dc6b...f7.exe
windows10-2004-x64
10e9172c1691...86.exe
windows10-2004-x64
10f6c86e8cbc...da.exe
windows10-2004-x64
10fbd8d72f7e...0c.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c.exe
Resource
win10v2004-20240508-en
General
-
Target
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
-
Size
1.3MB
-
MD5
eb745fe2c2df0c9642e60c076ebbb8a8
-
SHA1
cd9cf0966d4be269ab50bfb98635a74a0e958f57
-
SHA256
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0
-
SHA512
dc88627295a2e54b31599818e335fc3e76b6ebe53e0d23a0405270516446c4325769b5f0772f30502c22ec92e30cc8be0fd4192937436f3d5395c678d0845db8
-
SSDEEP
24576:oyM5I8I2r54QwinOnVK7oOKTX0fNRDgKwkGtUO5qcZ+ifXWp7B+WpwJMVd:vMCTQwiOVaoO7TwkGCO5qcI2mJAWpK
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral7/memory/2632-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral7/memory/2632-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral7/memory/2632-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x0007000000023487-40.dat family_redline behavioral7/memory/2628-42-0x0000000000D60000-0x0000000000D9E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4664 TC8zp8Sk.exe 1044 BO3uz4iD.exe 4068 jU7ag7xx.exe 1160 Ho4OM1ip.exe 4280 1Bl62sz1.exe 2628 2sP907Yn.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Ho4OM1ip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" TC8zp8Sk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" BO3uz4iD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" jU7ag7xx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4280 set thread context of 2632 4280 1Bl62sz1.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 2528 4280 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4664 1528 62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe 82 PID 1528 wrote to memory of 4664 1528 62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe 82 PID 1528 wrote to memory of 4664 1528 62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe 82 PID 4664 wrote to memory of 1044 4664 TC8zp8Sk.exe 83 PID 4664 wrote to memory of 1044 4664 TC8zp8Sk.exe 83 PID 4664 wrote to memory of 1044 4664 TC8zp8Sk.exe 83 PID 1044 wrote to memory of 4068 1044 BO3uz4iD.exe 84 PID 1044 wrote to memory of 4068 1044 BO3uz4iD.exe 84 PID 1044 wrote to memory of 4068 1044 BO3uz4iD.exe 84 PID 4068 wrote to memory of 1160 4068 jU7ag7xx.exe 85 PID 4068 wrote to memory of 1160 4068 jU7ag7xx.exe 85 PID 4068 wrote to memory of 1160 4068 jU7ag7xx.exe 85 PID 1160 wrote to memory of 4280 1160 Ho4OM1ip.exe 86 PID 1160 wrote to memory of 4280 1160 Ho4OM1ip.exe 86 PID 1160 wrote to memory of 4280 1160 Ho4OM1ip.exe 86 PID 4280 wrote to memory of 548 4280 1Bl62sz1.exe 89 PID 4280 wrote to memory of 548 4280 1Bl62sz1.exe 89 PID 4280 wrote to memory of 548 4280 1Bl62sz1.exe 89 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 4280 wrote to memory of 2632 4280 1Bl62sz1.exe 90 PID 1160 wrote to memory of 2628 1160 Ho4OM1ip.exe 95 PID 1160 wrote to memory of 2628 1160 Ho4OM1ip.exe 95 PID 1160 wrote to memory of 2628 1160 Ho4OM1ip.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe"C:\Users\Admin\AppData\Local\Temp\62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TC8zp8Sk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TC8zp8Sk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BO3uz4iD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BO3uz4iD.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jU7ag7xx.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jU7ag7xx.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ho4OM1ip.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ho4OM1ip.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Bl62sz1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Bl62sz1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 6087⤵
- Program crash
PID:2528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2sP907Yn.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2sP907Yn.exe6⤵
- Executes dropped EXE
PID:2628
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4280 -ip 42801⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD590e58d49d006bf3583129a2fa9cef24f
SHA146f53795e4a1596b8aaad6ed7fd95b22d3d04049
SHA256cbe2518d5aea2e594c721c6752ed2e532bb7d72ddfe025906c8a726f69e6d32b
SHA512ace13a601340f4bb698d889861ff476908ee009030d4eb742f15566d3ecf598854eeba734e9bd1955cc80bf9d40da8edbee6e384aef3ad08cc45f9edf3c6440a
-
Filesize
948KB
MD55627ccba42aeb077314d7a39e77ced49
SHA1842873f0d2405c15766cf9b4b7873fb5787904e9
SHA2564267680c713514c352b7e33936e7e3d3af53fcb996f9c86675a12facbfab4fca
SHA5125853dfb472e7e288714c6545839ab7d81e880ad284c7494bc53d0f6fcfdd80be82a9600dfd7a1ea6b73941a14c433c675fc8862ba15c364c4e43f3b8dddc30ec
-
Filesize
647KB
MD5e5546f2812847bec5844431d9f265553
SHA1dfefbcacce34491119d5f6e92eb6d40849d12c58
SHA256eed2e932e588b481ab8cd657783b15cc1c6562d691adf379d4acf46f2405a834
SHA512550f0bc605de269e06ec7c9c6ecf4baff35738788d48b4f0147af224af3956ef96b2b7ec44b868af9c3841e61e26d9bb8f03a2909c59ca592e6ce7b3e14cf8de
-
Filesize
451KB
MD54d41e34be72900417d3b2d1cba329828
SHA1053754af78e9783c4face121a82bdf2a188fc428
SHA256376467220eaf634338b1dc79625308a7ede386509bba0661cd345be9b034feb4
SHA51262e72a9591097542dd7f0c65ba3206e33052943a67b756d4100f16d37745c6ac5aa855892b60fe56b06188bff7cf97bba6419ec1dfb7dbf239d03b20d5206b97
-
Filesize
448KB
MD5c098e6e949f7bb07bf6f724872aaa1c4
SHA13384293915760d88053c871b92e449c4acce0ffa
SHA2563307b86a927033aab99e77f9f5787b4604a891c09585ae4e4267e3e8dabee79f
SHA512074b0e2e7703d31e94562559bb1196bde67e29b73241d5b9fc2e1ac410d3d56c616182c9bc77aa3b5af4ca7c8b2fee86d137fa14fa414613a01410f6100ea301
-
Filesize
221KB
MD50c685a90fa06ddc200e0fa9d4e3cdffd
SHA1f4048f9e449927b9ee811c97a2cbae494a0c1c23
SHA25649fdfec235050b0d20aa40fda2efdb29a34201c0786d77fa90c5d3aaf692b7c4
SHA5129552ed8ac78dbe960a821212df22569107af446294b537f66946696f79ad1f9bc1676cc0a070ac715473a99b9872796bdacf14180c5d844c620d084710566d89