Overview
overview
10Static
static
304079e5802...9d.exe
windows10-2004-x64
101c1f4eb981...3b.exe
windows10-2004-x64
102598a43559...cf.exe
windows10-2004-x64
103aa30d5528...5d.exe
windows10-2004-x64
1046e0ffa2e7...59.exe
windows10-2004-x64
104cc86e1dc4...05.exe
windows10-2004-x64
1061799398ea...0c.exe
windows10-2004-x64
106bfb353493...b4.exe
windows10-2004-x64
1070f5b2bcd0...c3.exe
windows7-x64
1070f5b2bcd0...c3.exe
windows10-2004-x64
107363065308...5d.exe
windows10-2004-x64
10864fc02972...03.exe
windows10-2004-x64
10979a085483...e6.exe
windows10-2004-x64
109bbc6ca861...5b.exe
windows10-2004-x64
10a22013e24e...09.exe
windows10-2004-x64
10c31e600a38...cd.exe
windows10-2004-x64
10e2e852038c...e5.exe
windows10-2004-x64
10ec4e6a678a...72.exe
windows10-2004-x64
10f46c47981f...85.exe
windows10-2004-x64
10f603ceb39f...6e.exe
windows10-2004-x64
10fbe6d8ed22...1a.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
04079e58020489439890f3d5d0980b8ad79ac8f655923829037345651f2f1b9d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1c1f4eb981ff56766e6798073020add168a1f4134cf43e140302c7cec4a6763b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3aa30d5528ebe1b7856b26587d689c01c4a94547c022f9b29bb7c32708782f5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
46e0ffa2e7aeb3575c3fe8308892dec47716f852e6427bc2c8e904e9cad2c659.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cc86e1dc4a166b675f01f27f52e179d83773f43736e54f40427866d6708ef05.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
61799398eaa0d8b997b6fa9158074d701b10e120c7cac093e92c6dfbd278f50c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
979a085483810f4b695eb3d0c531439887861b90277b6ede2d4f9eb7983065e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e2e852038c1504d54c9702b961095f0af961417103d2a5c8b10740dc188ac5e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ec4e6a678a24fbc6072d65beb0203bf9dc01f768df9a7430ed0d827b8d290172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f603ceb39fc4d835e57a02751723a2eb0538b0f955a7772c30556e0e0d723f6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe
Resource
win10v2004-20240426-en
General
-
Target
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe
-
Size
958KB
-
MD5
4ad1e312b136f5dd68262f68956e8eb2
-
SHA1
bf6029901839942b3becfcab9d2b40bb90b46aa2
-
SHA256
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609
-
SHA512
65daf9d1b3fe2b401fad5a89611bf33798feea6d701bb54852360593b16f39e94e502f2ccc5ddf7581929f069e511ce78f1a45b552e7638280e07829137302d4
-
SSDEEP
12288:oMrfy909VUE3/HgdPY5VZEcVM3VFE481hDVaLldi52tiIDayvr/JOCvVvq9Qj0W6:3yAfHgdPY5/4P9AZ+ftibCvViC96
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral15/files/0x0008000000023422-19.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral15/files/0x0007000000023423-22.dat family_redline behavioral15/memory/4152-24-0x00000000001B0000-0x00000000001EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3580 Rz4UK7aI.exe 3628 Io4vk1So.exe 3336 1Yi26qy9.exe 4152 2Av466Gj.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Io4vk1So.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Rz4UK7aI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3960 wrote to memory of 3580 3960 a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe 82 PID 3960 wrote to memory of 3580 3960 a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe 82 PID 3960 wrote to memory of 3580 3960 a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe 82 PID 3580 wrote to memory of 3628 3580 Rz4UK7aI.exe 83 PID 3580 wrote to memory of 3628 3580 Rz4UK7aI.exe 83 PID 3580 wrote to memory of 3628 3580 Rz4UK7aI.exe 83 PID 3628 wrote to memory of 3336 3628 Io4vk1So.exe 84 PID 3628 wrote to memory of 3336 3628 Io4vk1So.exe 84 PID 3628 wrote to memory of 3336 3628 Io4vk1So.exe 84 PID 3628 wrote to memory of 4152 3628 Io4vk1So.exe 85 PID 3628 wrote to memory of 4152 3628 Io4vk1So.exe 85 PID 3628 wrote to memory of 4152 3628 Io4vk1So.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe"C:\Users\Admin\AppData\Local\Temp\a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rz4UK7aI.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rz4UK7aI.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Io4vk1So.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Io4vk1So.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Yi26qy9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Yi26qy9.exe4⤵
- Executes dropped EXE
PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Av466Gj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Av466Gj.exe4⤵
- Executes dropped EXE
PID:4152
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD5f6f1079f2f1f431a07a0f38d94eb119c
SHA1ce4380a8502aaa5cfb4daa415f0f7899c5f17ca1
SHA256f191c21038b4ed5ff71948476aac8ac2e148fc9b69e59ce649e91e7392eb241b
SHA51227f390408671dc3b1d899c7b8f5e0cc93edd450557981fb563efeb07f7bd7c6fd1b91ce9d007c237b1b815d75e0e3ec75321a73b6dd9cb75a557a18dadf0b1a6
-
Filesize
324KB
MD551e2cea8a22fbec57cc0e831e96fd462
SHA1602a2c35fbbfa7169a4aa84c42248801331dd75c
SHA25629b1760366159610f981c96b5a1f167377daf242506001461dfb21bc6d9bd0d4
SHA5122bbc55a5e5cda105fa74e8883f2238cf59cf2b43a6d63449ae94617994c3d0b6fc8a09b86a09f2f81cacbc2838e2bbe54c74f814634f50044389daa26b43c316
-
Filesize
186KB
MD53a24a41f3044d90555f6cdea0f2533f8
SHA125a1913e9e41dd13039d023a5f63a050256c72ca
SHA2565e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253
SHA5128d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837
-
Filesize
222KB
MD59e0956c42728e4942da2f703075f1b7e
SHA14bdaf4fb7d0a7cbd873e99cdb5f4ccad9a0ad321
SHA256f790216de2ae2f24f9accb9bd06e7d692b6c6b9f2cf58fd612c6365ea7138544
SHA512a5e27914dff7258e372b51061bf075bdb1f1769881faf9adf185a56dd8a8b9f6cbe27a62100965cd40159f9aebb92a14b74a6078e60e8a7cba7920f3cd7b7c2e