Overview
overview
10Static
static
304079e5802...9d.exe
windows10-2004-x64
101c1f4eb981...3b.exe
windows10-2004-x64
102598a43559...cf.exe
windows10-2004-x64
103aa30d5528...5d.exe
windows10-2004-x64
1046e0ffa2e7...59.exe
windows10-2004-x64
104cc86e1dc4...05.exe
windows10-2004-x64
1061799398ea...0c.exe
windows10-2004-x64
106bfb353493...b4.exe
windows10-2004-x64
1070f5b2bcd0...c3.exe
windows7-x64
1070f5b2bcd0...c3.exe
windows10-2004-x64
107363065308...5d.exe
windows10-2004-x64
10864fc02972...03.exe
windows10-2004-x64
10979a085483...e6.exe
windows10-2004-x64
109bbc6ca861...5b.exe
windows10-2004-x64
10a22013e24e...09.exe
windows10-2004-x64
10c31e600a38...cd.exe
windows10-2004-x64
10e2e852038c...e5.exe
windows10-2004-x64
10ec4e6a678a...72.exe
windows10-2004-x64
10f46c47981f...85.exe
windows10-2004-x64
10f603ceb39f...6e.exe
windows10-2004-x64
10fbe6d8ed22...1a.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
04079e58020489439890f3d5d0980b8ad79ac8f655923829037345651f2f1b9d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1c1f4eb981ff56766e6798073020add168a1f4134cf43e140302c7cec4a6763b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3aa30d5528ebe1b7856b26587d689c01c4a94547c022f9b29bb7c32708782f5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
46e0ffa2e7aeb3575c3fe8308892dec47716f852e6427bc2c8e904e9cad2c659.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cc86e1dc4a166b675f01f27f52e179d83773f43736e54f40427866d6708ef05.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
61799398eaa0d8b997b6fa9158074d701b10e120c7cac093e92c6dfbd278f50c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
979a085483810f4b695eb3d0c531439887861b90277b6ede2d4f9eb7983065e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e2e852038c1504d54c9702b961095f0af961417103d2a5c8b10740dc188ac5e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ec4e6a678a24fbc6072d65beb0203bf9dc01f768df9a7430ed0d827b8d290172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f603ceb39fc4d835e57a02751723a2eb0538b0f955a7772c30556e0e0d723f6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe
Resource
win10v2004-20240426-en
General
-
Target
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe
-
Size
1.5MB
-
MD5
6c897a3879043ccbab5e695cfe6a5bd1
-
SHA1
35d1b8b5097a9fea72de3b14e54c7ab911b798d2
-
SHA256
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4
-
SHA512
b849cf54fac1c49774904d68f9df27c271d9124857c2486684eef308a7731602aa8f6166b1c58c4cf47698da71fdcbf470123a4a731db60b1fc11d475181924b
-
SSDEEP
24576:3yOLPlyv/2XMP7A9V02yvQKDU/spDChnT2Rokh/1WIvUHpGy3NiPXTBNSvh:COLPlVXMPmpyvBDU/4ehqR11vcEPXTB4
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral8/memory/2164-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral8/memory/2164-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral8/memory/2164-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral8/files/0x0007000000023429-40.dat family_redline behavioral8/memory/2136-42-0x0000000000A50000-0x0000000000A8E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1308 ce1Bj0gD.exe 3344 Jk4xd5ZC.exe 3356 XO3ob9WL.exe 3772 Zw9kw2xJ.exe 508 1YJ21dl7.exe 2136 2mp181fb.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ce1Bj0gD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Jk4xd5ZC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" XO3ob9WL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Zw9kw2xJ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 508 set thread context of 2164 508 1YJ21dl7.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 4376 508 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3300 wrote to memory of 1308 3300 6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe 82 PID 3300 wrote to memory of 1308 3300 6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe 82 PID 3300 wrote to memory of 1308 3300 6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe 82 PID 1308 wrote to memory of 3344 1308 ce1Bj0gD.exe 83 PID 1308 wrote to memory of 3344 1308 ce1Bj0gD.exe 83 PID 1308 wrote to memory of 3344 1308 ce1Bj0gD.exe 83 PID 3344 wrote to memory of 3356 3344 Jk4xd5ZC.exe 85 PID 3344 wrote to memory of 3356 3344 Jk4xd5ZC.exe 85 PID 3344 wrote to memory of 3356 3344 Jk4xd5ZC.exe 85 PID 3356 wrote to memory of 3772 3356 XO3ob9WL.exe 87 PID 3356 wrote to memory of 3772 3356 XO3ob9WL.exe 87 PID 3356 wrote to memory of 3772 3356 XO3ob9WL.exe 87 PID 3772 wrote to memory of 508 3772 Zw9kw2xJ.exe 89 PID 3772 wrote to memory of 508 3772 Zw9kw2xJ.exe 89 PID 3772 wrote to memory of 508 3772 Zw9kw2xJ.exe 89 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 508 wrote to memory of 2164 508 1YJ21dl7.exe 91 PID 3772 wrote to memory of 2136 3772 Zw9kw2xJ.exe 95 PID 3772 wrote to memory of 2136 3772 Zw9kw2xJ.exe 95 PID 3772 wrote to memory of 2136 3772 Zw9kw2xJ.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe"C:\Users\Admin\AppData\Local\Temp\6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ce1Bj0gD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ce1Bj0gD.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Jk4xd5ZC.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Jk4xd5ZC.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XO3ob9WL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\XO3ob9WL.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Zw9kw2xJ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Zw9kw2xJ.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1YJ21dl7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1YJ21dl7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1367⤵
- Program crash
PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mp181fb.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mp181fb.exe6⤵
- Executes dropped EXE
PID:2136
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 508 -ip 5081⤵PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD532c24fc796294197e3c95b00123a16bc
SHA1569fd9205fad4613a4db4fe59a19c0aa2bfaab57
SHA256aa28c87adbc4405f5f65f7c30725aabe75dc3ac5d0878e6e013f38b1d1924bdf
SHA512f4afd6a27a663bb2e8df8c197243d2493fb6e53be42a85315243a12efc53d6772c92718a082361e49ca4e989514bd221f2cdbf060fbc7e879fe559dbed0c8bf8
-
Filesize
1.1MB
MD5b2f1c0c8e05bfdaf3bc466f4b92d0b43
SHA13b9ff70840f34f11462fb69b3c98962c3f7b98ff
SHA256bdc1a6e23872abc2dec549e0a6966630185abb72a6ee4afbd2e7cf2f69c5d735
SHA5120c44c8836254ef239bdcf59de306b0da2149e404c447cc9a231c03166ceae56b6c520934312ab19588a2375e88d72644260bf5d4c7da8c5738f059ff12444ce9
-
Filesize
758KB
MD55c24b6ac38ff31ac426b0c3ce699d737
SHA150fc82ebd9b0b09aab86ee23b5fc12730a6c06d6
SHA256983c0280db5d78ee48668a4d2b243aec778d54dce53dde9207f41685053b5e5d
SHA51254bedd90d990d9008c71997d78fd842145a8cdb7a9ff1641f9c6c22e1fb2db6986836ca643b25f45d5eb737063900f5cc8aff0355163f49621d3967717c2ba1d
-
Filesize
562KB
MD5b25eea05b72553c6d62b26b1f612d08b
SHA138c26b582e49b71e65e98518145acf270f35f2d3
SHA256f9b0155c9f35c5ecd34ff22291cc8646a63a68df98b024ca0353900926572d5c
SHA512c8042fb41df06c52558e677b249310d00b8c344ad89374b2858219df9e9f92ebcf8448ee6bb140de28c8aa99c68e834cf75e26eaf39ed772c1734e058a9e4289
-
Filesize
1.1MB
MD5de0eb50ae8edabe04b12e19313478d94
SHA11ced95841bb6d4fa854a576b4352a204531ce5c2
SHA256f0fecbaff766cf8160143551cd1cfdc893054d7badff08004ba2e39bb09dcb6f
SHA512bd33267e564a2904c5cbe2041e68389826de75529b15e6ae5d66615d50780a050beb4b50136d18747e63f6a761720b2cb6a2ee11b983b8ed50153582e661e289
-
Filesize
221KB
MD5d72ba0a719236b585c2136e1b3e86de4
SHA1ba358d332386201d5e529fa27ebf300c5fd8823c
SHA2569fb77677ec63c763fd6b013e234705505dc542bd1c8b40fa6472cf037be1155c
SHA5127e8bc6ba466a3386e428b008d806967c0a35f67354be892f46e66d4d1abf8e089b9d280cfc64a001680542fd9c2486b2c98a5a9ec228b5f51ad478bac7229ead