Overview
overview
10Static
static
304079e5802...9d.exe
windows10-2004-x64
101c1f4eb981...3b.exe
windows10-2004-x64
102598a43559...cf.exe
windows10-2004-x64
103aa30d5528...5d.exe
windows10-2004-x64
1046e0ffa2e7...59.exe
windows10-2004-x64
104cc86e1dc4...05.exe
windows10-2004-x64
1061799398ea...0c.exe
windows10-2004-x64
106bfb353493...b4.exe
windows10-2004-x64
1070f5b2bcd0...c3.exe
windows7-x64
1070f5b2bcd0...c3.exe
windows10-2004-x64
107363065308...5d.exe
windows10-2004-x64
10864fc02972...03.exe
windows10-2004-x64
10979a085483...e6.exe
windows10-2004-x64
109bbc6ca861...5b.exe
windows10-2004-x64
10a22013e24e...09.exe
windows10-2004-x64
10c31e600a38...cd.exe
windows10-2004-x64
10e2e852038c...e5.exe
windows10-2004-x64
10ec4e6a678a...72.exe
windows10-2004-x64
10f46c47981f...85.exe
windows10-2004-x64
10f603ceb39f...6e.exe
windows10-2004-x64
10fbe6d8ed22...1a.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
04079e58020489439890f3d5d0980b8ad79ac8f655923829037345651f2f1b9d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1c1f4eb981ff56766e6798073020add168a1f4134cf43e140302c7cec4a6763b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3aa30d5528ebe1b7856b26587d689c01c4a94547c022f9b29bb7c32708782f5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
46e0ffa2e7aeb3575c3fe8308892dec47716f852e6427bc2c8e904e9cad2c659.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cc86e1dc4a166b675f01f27f52e179d83773f43736e54f40427866d6708ef05.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
61799398eaa0d8b997b6fa9158074d701b10e120c7cac093e92c6dfbd278f50c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
979a085483810f4b695eb3d0c531439887861b90277b6ede2d4f9eb7983065e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e2e852038c1504d54c9702b961095f0af961417103d2a5c8b10740dc188ac5e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ec4e6a678a24fbc6072d65beb0203bf9dc01f768df9a7430ed0d827b8d290172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f603ceb39fc4d835e57a02751723a2eb0538b0f955a7772c30556e0e0d723f6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe
Resource
win10v2004-20240426-en
General
-
Target
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe
-
Size
1.3MB
-
MD5
2225c03c5bb14e2e02f8d888252d3d12
-
SHA1
326be1965a1539524141ea1a5707a157c7d4d5f5
-
SHA256
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b
-
SHA512
3fa39ee0552ce33bad2327d2f4f59be2e11452b011292e3795db32b53a50a71b4350f8d92021b5fd068fa7dc2c12f93dd78487f3f24035ca420ddbe2a0391f92
-
SSDEEP
24576:5y0LMN4FQFK9kCT0ROmvezfvKo3kqva6i3+V5O66s2kd9sR5gfyTBpTSMj68wM8W:s0LbFlqvBmr1kqyvslASSgfy9UMjHwD
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral14/files/0x00080000000234c5-33.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral14/files/0x00070000000234c6-36.dat family_redline behavioral14/memory/2612-38-0x0000000000DB0000-0x0000000000DEE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3232 nj4yr8zq.exe 4652 Hl0Ia4Xo.exe 3824 OT0zY3Ac.exe 2812 AZ0Tf2sG.exe 1336 1gs84zQ2.exe 2612 2Zk641Kf.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nj4yr8zq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Hl0Ia4Xo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" OT0zY3Ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" AZ0Tf2sG.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3232 4308 9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe 83 PID 4308 wrote to memory of 3232 4308 9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe 83 PID 4308 wrote to memory of 3232 4308 9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe 83 PID 3232 wrote to memory of 4652 3232 nj4yr8zq.exe 84 PID 3232 wrote to memory of 4652 3232 nj4yr8zq.exe 84 PID 3232 wrote to memory of 4652 3232 nj4yr8zq.exe 84 PID 4652 wrote to memory of 3824 4652 Hl0Ia4Xo.exe 85 PID 4652 wrote to memory of 3824 4652 Hl0Ia4Xo.exe 85 PID 4652 wrote to memory of 3824 4652 Hl0Ia4Xo.exe 85 PID 3824 wrote to memory of 2812 3824 OT0zY3Ac.exe 86 PID 3824 wrote to memory of 2812 3824 OT0zY3Ac.exe 86 PID 3824 wrote to memory of 2812 3824 OT0zY3Ac.exe 86 PID 2812 wrote to memory of 1336 2812 AZ0Tf2sG.exe 88 PID 2812 wrote to memory of 1336 2812 AZ0Tf2sG.exe 88 PID 2812 wrote to memory of 1336 2812 AZ0Tf2sG.exe 88 PID 2812 wrote to memory of 2612 2812 AZ0Tf2sG.exe 89 PID 2812 wrote to memory of 2612 2812 AZ0Tf2sG.exe 89 PID 2812 wrote to memory of 2612 2812 AZ0Tf2sG.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe"C:\Users\Admin\AppData\Local\Temp\9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nj4yr8zq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nj4yr8zq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Hl0Ia4Xo.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Hl0Ia4Xo.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\OT0zY3Ac.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\OT0zY3Ac.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\AZ0Tf2sG.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\AZ0Tf2sG.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1gs84zQ2.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1gs84zQ2.exe6⤵
- Executes dropped EXE
PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Zk641Kf.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Zk641Kf.exe6⤵
- Executes dropped EXE
PID:2612
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5bdb6c0ef90a90db380cccc43eabdea68
SHA1dbc09f37ddc2c3e198d96fdc88fc19c5384e308c
SHA25613dcdff00505d67249c8829830e2255eefaa24ea740bb1080874963763e9c8d2
SHA5120bec1f51b8f08c64deda1a3b3bea70ad06f3faa15da4757d71ce906d36e8789fb42e89a1b0aad49e0ae3daad8ee6b8ef37314f45470d07ab8d8abc072dde36dd
-
Filesize
1.0MB
MD5b8f67da3d18ae902823fb8dc214f7ea0
SHA1772723c653234ebddcbb694673220c562f3204a7
SHA256d893aafc151cb9844bc61bab4eeac2b6d72bb1e5da29ed5ac6992b2414c2a534
SHA512127ad7630a73d691ddecf41c3234a1e9b7f199516ca2b58a2b440faf79909092c7affb7bae8c6bf658c45db3bfd1aff662715c1ffaac22fe4ff84f4f91dfa658
-
Filesize
522KB
MD579c6d74cd49f423ed2557a23e26a13ec
SHA18c75ad65571c9ac786fe230b4674169f7bd11ff5
SHA2566a488f94cc48228eaf52eae27828e12987bb44a2dda1046a8bf56c846655a303
SHA512d405e41b67a51903c56085b63919632e4f11c0d59766cacf03a1305a8c97e2bbc36f17ce0335f1d5105927538e84a07d067b3c81d17602cbe0ee0ab5a213034d
-
Filesize
326KB
MD599f0be4cb2f1f8389c193ad86510bf63
SHA1b7e2fccbc6037b0ef01aedce2a499d2b7855deb0
SHA2562d9d0c2b54cf579136f4d9c7c90119962cf8530753d8c4453e41a69d861196de
SHA51245826ee2ee8c4af4eb50fd21759e018f27e7bdd22977525bdc5e55085e847a3099f00206273db131753bf9e67ec3532ad70d2b0e14b1256a3c72232a7e7ba258
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84
-
Filesize
221KB
MD546ebd974a5837ecbe5f28a9245f70188
SHA17136e53cb3a02fca9434b035ca7cd0e87af65c26
SHA2569a8a9c591836f06c1c972e2953c91518344e6cba1c442aca9a93c5b796d92ed9
SHA512012fa679718df16d46f49a195d2c6e061e7b402145039296d822dbdd31dc51b21270d17d1272b919b7376e2e4a173aa7a16bd9218ac8a1713498476c865be4b4