Overview
overview
10Static
static
304079e5802...9d.exe
windows10-2004-x64
101c1f4eb981...3b.exe
windows10-2004-x64
102598a43559...cf.exe
windows10-2004-x64
103aa30d5528...5d.exe
windows10-2004-x64
1046e0ffa2e7...59.exe
windows10-2004-x64
104cc86e1dc4...05.exe
windows10-2004-x64
1061799398ea...0c.exe
windows10-2004-x64
106bfb353493...b4.exe
windows10-2004-x64
1070f5b2bcd0...c3.exe
windows7-x64
1070f5b2bcd0...c3.exe
windows10-2004-x64
107363065308...5d.exe
windows10-2004-x64
10864fc02972...03.exe
windows10-2004-x64
10979a085483...e6.exe
windows10-2004-x64
109bbc6ca861...5b.exe
windows10-2004-x64
10a22013e24e...09.exe
windows10-2004-x64
10c31e600a38...cd.exe
windows10-2004-x64
10e2e852038c...e5.exe
windows10-2004-x64
10ec4e6a678a...72.exe
windows10-2004-x64
10f46c47981f...85.exe
windows10-2004-x64
10f603ceb39f...6e.exe
windows10-2004-x64
10fbe6d8ed22...1a.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
04079e58020489439890f3d5d0980b8ad79ac8f655923829037345651f2f1b9d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1c1f4eb981ff56766e6798073020add168a1f4134cf43e140302c7cec4a6763b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3aa30d5528ebe1b7856b26587d689c01c4a94547c022f9b29bb7c32708782f5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
46e0ffa2e7aeb3575c3fe8308892dec47716f852e6427bc2c8e904e9cad2c659.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cc86e1dc4a166b675f01f27f52e179d83773f43736e54f40427866d6708ef05.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
61799398eaa0d8b997b6fa9158074d701b10e120c7cac093e92c6dfbd278f50c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
979a085483810f4b695eb3d0c531439887861b90277b6ede2d4f9eb7983065e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e2e852038c1504d54c9702b961095f0af961417103d2a5c8b10740dc188ac5e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ec4e6a678a24fbc6072d65beb0203bf9dc01f768df9a7430ed0d827b8d290172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f603ceb39fc4d835e57a02751723a2eb0538b0f955a7772c30556e0e0d723f6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe
Resource
win10v2004-20240426-en
General
-
Target
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe
-
Size
1.3MB
-
MD5
e19af8058d1c10695db59ff06382095c
-
SHA1
74879eca322c96e26ccc9d52b87c3f47d54cedf4
-
SHA256
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf
-
SHA512
2985aac9377a1d12090a1db16137338715ff9c5e857096f4b33b37f6f2af9463346e0ce859324c5c1f15eee83885f1c1d2ceb6ec9d3d00a6033e437d11af9dee
-
SSDEEP
24576:0y4htUc734dBIbW67vwZTO5aS/Fg4PE5jPBgBUZKA7/lkk5EA:D4htv2y7g0g4cZRDjR5E
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral3/memory/4348-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral3/memory/4348-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral3/memory/4348-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral3/files/0x0007000000023293-39.dat family_redline behavioral3/memory/1480-42-0x0000000000AE0000-0x0000000000B1E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1264 gt0aC2kl.exe 4232 Bf1Mm6wM.exe 4604 Ra9hI4vN.exe 3164 fI4eZ4ii.exe 3432 1IQ76oz8.exe 1480 2QS669YZ.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gt0aC2kl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Bf1Mm6wM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Ra9hI4vN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" fI4eZ4ii.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3432 set thread context of 4348 3432 1IQ76oz8.exe 94 -
Program crash 1 IoCs
pid pid_target Process procid_target 1768 3432 WerFault.exe 93 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1264 4068 2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe 89 PID 4068 wrote to memory of 1264 4068 2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe 89 PID 4068 wrote to memory of 1264 4068 2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe 89 PID 1264 wrote to memory of 4232 1264 gt0aC2kl.exe 90 PID 1264 wrote to memory of 4232 1264 gt0aC2kl.exe 90 PID 1264 wrote to memory of 4232 1264 gt0aC2kl.exe 90 PID 4232 wrote to memory of 4604 4232 Bf1Mm6wM.exe 91 PID 4232 wrote to memory of 4604 4232 Bf1Mm6wM.exe 91 PID 4232 wrote to memory of 4604 4232 Bf1Mm6wM.exe 91 PID 4604 wrote to memory of 3164 4604 Ra9hI4vN.exe 92 PID 4604 wrote to memory of 3164 4604 Ra9hI4vN.exe 92 PID 4604 wrote to memory of 3164 4604 Ra9hI4vN.exe 92 PID 3164 wrote to memory of 3432 3164 fI4eZ4ii.exe 93 PID 3164 wrote to memory of 3432 3164 fI4eZ4ii.exe 93 PID 3164 wrote to memory of 3432 3164 fI4eZ4ii.exe 93 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3432 wrote to memory of 4348 3432 1IQ76oz8.exe 94 PID 3164 wrote to memory of 1480 3164 fI4eZ4ii.exe 98 PID 3164 wrote to memory of 1480 3164 fI4eZ4ii.exe 98 PID 3164 wrote to memory of 1480 3164 fI4eZ4ii.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe"C:\Users\Admin\AppData\Local\Temp\2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gt0aC2kl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gt0aC2kl.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bf1Mm6wM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Bf1Mm6wM.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ra9hI4vN.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ra9hI4vN.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fI4eZ4ii.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fI4eZ4ii.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1IQ76oz8.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1IQ76oz8.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 5767⤵
- Program crash
PID:1768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QS669YZ.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QS669YZ.exe6⤵
- Executes dropped EXE
PID:1480
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3432 -ip 34321⤵PID:2128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4196 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56abc100af2fb0c5195db4c82bea69717
SHA13b257d9569562df3cfbffd17be6bc34ad050d6d8
SHA256fde683fd96f5a0e9298acfea737879915d85a5f645de46bdb6b08d12a9cbcdae
SHA51217348c5514db27897639fa9bc1862b8faf2c34aee32af9a49d5b710ed2e791a454a5e2ce7329ca42d1fd96ad1d95c25bd98124e07802278220503e0c4d7ed461
-
Filesize
949KB
MD5a53015d8b49d63a2d4cadf2195557ca6
SHA1fad7dcb400c2557be3b7e41edcd3735ea5b0a38a
SHA256bd90e58a7ee36f53ee8f63b183e89de46942c29b576c5bd1ec68fb150a61520f
SHA512af63453c8f8af221de59a84744b53777b89863faab9bef5e7700c98a4d28cde8352587ba8ead814d54011370ed3447cc41a305f00687726b3ea4d4125b1a11a9
-
Filesize
645KB
MD5e80114723fe4b6b164b6b6e3c8a7ba82
SHA1ca76fc7c25f54403419c065f610094363e3961b4
SHA256da5f73535ed945a679a2cc6f0aa477da7e52e290ae147e4e0ac5e84031f1c59b
SHA512dbf4afdd735f8377d36845a1300902295bd7b954f06e8237637b14c885ebc74c2eb2aa227600a07fa759744604f4e7c6667797ac0cb2358dd46670b205622699
-
Filesize
449KB
MD555694bc98ddf85201c32ec8b2903766a
SHA1781918266d8b400e1faa12c2339ed844009666e5
SHA25643da2a0a11ae463cef4f0ea5a162a007c32808b89661468853d837c638e01e37
SHA5124ae556fd775f74f642c4248ffb2f3865eaa25025c101473a3d27c05af45ced26f17d68b0c57402a39b859b36921363f93eb68df0a00ad3b81ac7d4ae0e4818bd
-
Filesize
446KB
MD5f72f7ce68786940e325b04efb37eed20
SHA1be0f1b14cb6770468b549c9529c80107ea6bf3e3
SHA2564f681293759a743adbd7f803fbe4875cb48f90657054c01cf1abb9400452f9a4
SHA512e7ce5ecefa1e70956ff4b795cac039432f65ce593277f08feb633edccb285d2357cf0b119685d117230607ccd76489b1d934cb72615f3d25b38542dddfffaa4d
-
Filesize
222KB
MD5781c6c4fb67b356ff62d815ce87a6de9
SHA1f4a40a32f2f5a23b1e50df44c6a4479cf72459cd
SHA256def9310e23962509bdfc9c6d3cc3a4d88cb2c2fea955a37deced707fa6d57cab
SHA5127b0877a213357fdf70bb6f69e929b27eca77dd8077b75e1b73256d63bd0fc71a9916da750f7e1a9a017e70cccc7bce4dd0ae463edc06b4d1103a9be8a176420e