Overview
overview
10Static
static
30314c3cf58...62.exe
windows10-2004-x64
10142ed11f80...59.exe
windows10-2004-x64
101f54336cee...4f.exe
windows10-2004-x64
102470f02746...37.exe
windows10-2004-x64
10357dca1dd0...e2.exe
windows7-x64
10357dca1dd0...e2.exe
windows10-2004-x64
10367729c840...03.exe
windows10-2004-x64
103ae8cc733e...e3.exe
windows10-2004-x64
103ff87c5bd0...30.exe
windows10-2004-x64
104157cda315...a6.exe
windows10-2004-x64
105f318080c6...ea.exe
windows10-2004-x64
10620f9ee1b4...8f.exe
windows10-2004-x64
106817354347...3a.exe
windows10-2004-x64
10753cdc12b9...91.exe
windows10-2004-x64
10a4215d26b6...74.exe
windows10-2004-x64
10a4375e040f...82.exe
windows10-2004-x64
10a619ae77d5...2e.exe
windows10-2004-x64
10aaab139650...12.exe
windows10-2004-x64
10aefec08eba...49.exe
windows10-2004-x64
10d12f5fa25c...70.exe
windows10-2004-x64
7e5b42981fd...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
0314c3cf5875f5a348b62f28e53ec17a9180933fb126d66b7184ebbc62e3c362.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
367729c84050746eb20cd233e6b8d8cfe0625110da6e43f4b4c486aa19d08103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
3ff87c5bd0d476dfc954d3706672474698d1e412030e6189e037c2474b97b730.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
4157cda3159c7d2c99d18138d2e023dd1d821d09ae77e78901a80b26492981a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
5f318080c6c0aef583c575f49bd61e9b4e8b6784f4c52b512e9c07090e4cedea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
620f9ee1b442855f9904f5108cf7185b16d0acbacad9aaa076f02e0ffd4f588f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
753cdc12b984ece991f2018329d37985ee627640895e2d9b9a43a13a6dd6fb91.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
a4375e040f13128a4dc747d845dd82b7204008c71beb526483b369eea30d2582.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
a619ae77d542717361e631ceb6fe3fab295af4ccef45ae4774b92a9355b6bb2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d12f5fa25c8ef0ae322be4daa1b08acf499c9d1be60c2f8d6f6b5a65c28f0a70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e5b42981fd5d352478cd9e79d582bc92295cb43d3d32dfd59e84008eb4216c65.exe
Resource
win10v2004-20240426-en
General
-
Target
68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe
-
Size
633KB
-
MD5
ade1582c6f516a251b48126cd5f22f55
-
SHA1
8f2dbe7998b7ca7090eb7b0ad8192ae798b5d488
-
SHA256
68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a
-
SHA512
96f1f614d8b2092a16ee69003c1340e9623e5742e09d8956deb368b47078b1be6d1a5a6952e90002732537efc6c6032311fbf66dda0fe79c379704d200f1e1fe
-
SSDEEP
12288:bMrjy90C6QjVHg1WhG2w6jE9l3bfr0M4rI6pvIlIE4uXIU1/s:oyP6YVHO0G2K/LzoVDE4uXIU1/s
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral13/memory/3648-19-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral13/memory/3648-22-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral13/memory/3648-20-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral13/memory/4528-14-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral13/memory/1152-26-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4408 z6954207.exe 396 q0800690.exe 2868 r3435926.exe 4568 s7623519.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6954207.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 396 set thread context of 4528 396 q0800690.exe 85 PID 2868 set thread context of 3648 2868 r3435926.exe 93 PID 4568 set thread context of 1152 4568 s7623519.exe 97 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3696 sc.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3688 396 WerFault.exe 83 3948 2868 WerFault.exe 92 1572 4568 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4528 AppLaunch.exe 4528 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4528 AppLaunch.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4408 1988 68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe 82 PID 1988 wrote to memory of 4408 1988 68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe 82 PID 1988 wrote to memory of 4408 1988 68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe 82 PID 4408 wrote to memory of 396 4408 z6954207.exe 83 PID 4408 wrote to memory of 396 4408 z6954207.exe 83 PID 4408 wrote to memory of 396 4408 z6954207.exe 83 PID 396 wrote to memory of 2652 396 q0800690.exe 84 PID 396 wrote to memory of 2652 396 q0800690.exe 84 PID 396 wrote to memory of 2652 396 q0800690.exe 84 PID 396 wrote to memory of 4528 396 q0800690.exe 85 PID 396 wrote to memory of 4528 396 q0800690.exe 85 PID 396 wrote to memory of 4528 396 q0800690.exe 85 PID 396 wrote to memory of 4528 396 q0800690.exe 85 PID 396 wrote to memory of 4528 396 q0800690.exe 85 PID 396 wrote to memory of 4528 396 q0800690.exe 85 PID 396 wrote to memory of 4528 396 q0800690.exe 85 PID 396 wrote to memory of 4528 396 q0800690.exe 85 PID 4408 wrote to memory of 2868 4408 z6954207.exe 92 PID 4408 wrote to memory of 2868 4408 z6954207.exe 92 PID 4408 wrote to memory of 2868 4408 z6954207.exe 92 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 2868 wrote to memory of 3648 2868 r3435926.exe 93 PID 1988 wrote to memory of 4568 1988 68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe 96 PID 1988 wrote to memory of 4568 1988 68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe 96 PID 1988 wrote to memory of 4568 1988 68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe 96 PID 4568 wrote to memory of 1152 4568 s7623519.exe 97 PID 4568 wrote to memory of 1152 4568 s7623519.exe 97 PID 4568 wrote to memory of 1152 4568 s7623519.exe 97 PID 4568 wrote to memory of 1152 4568 s7623519.exe 97 PID 4568 wrote to memory of 1152 4568 s7623519.exe 97 PID 4568 wrote to memory of 1152 4568 s7623519.exe 97 PID 4568 wrote to memory of 1152 4568 s7623519.exe 97 PID 4568 wrote to memory of 1152 4568 s7623519.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe"C:\Users\Admin\AppData\Local\Temp\68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6954207.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6954207.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q0800690.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q0800690.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 6084⤵
- Program crash
PID:3688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3435926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3435926.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 5644⤵
- Program crash
PID:3948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7623519.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7623519.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 5923⤵
- Program crash
PID:1572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 396 -ip 3961⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2868 -ip 28681⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4568 -ip 45681⤵PID:2224
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD56829efb4da0030cfa94ecdcac2086ff3
SHA1c438c4106b2f3a554297d58b6770a3f4540d8742
SHA2561406b87b7ed715b2e22e5d26ba324b62900483a559f8cdce3364b803d08b8a17
SHA512c443e443d0238ebb5876e0e9c8e77a52e569ac9dca65e3bd02363ffa2a3cbf868ce1364cde4f4f4abaeccd310142e65e18f9232d41164b13cbeed6d223f4e14c
-
Filesize
355KB
MD5b506c2e70307b288351f84753d07adfb
SHA16b8e9e36d2d4df7fe63c1b44d26a5be699187112
SHA25692bbf7e7f88810770ec295f64957e195f2199439dc7fe323687f5ef644675168
SHA51254cfaf8d891b04045429a0ef613bbc9dc65415b83b590c0a13b1bd64f620f4ca56db2d1ca0f6a33ea367e9d5af1cb09c794309aba4ff8c68c8327714131d3f77
-
Filesize
250KB
MD58dfd80cf2ff800cceb193b13b91ebcba
SHA139e4ad8623d87763be1decd29da1fd3b22024604
SHA2560b91e62e241ab2354e6da555313164026de466ef9af888b961e99dffd18c09a2
SHA5128bd5b9d41976c1db1b96988725fd3a77671d3f064e31708d9aae1e282db37ae4d3dd0c132dfbff29004c8f285da1f33a49b684d96b13c8b064c66a07ce385494
-
Filesize
379KB
MD5d82df25bfb43f92d3b40e8a2f9653d47
SHA159f683b525bf05e29bdd20060edada9905f63739
SHA2569c2767a3b910fba2cd0e9ec9e07aa7570da0ea26aa3f19a0d8f986f516476e42
SHA512e6c680083d039b5c3670a9cde4bb8b799b051f0a4cdc14513c1ff274782f449cf5d8816dfd49a4def0effb2094d46e224517f510919727cca53cb145cf4b847d