Overview
overview
10Static
static
30314c3cf58...62.exe
windows10-2004-x64
10142ed11f80...59.exe
windows10-2004-x64
101f54336cee...4f.exe
windows10-2004-x64
102470f02746...37.exe
windows10-2004-x64
10357dca1dd0...e2.exe
windows7-x64
10357dca1dd0...e2.exe
windows10-2004-x64
10367729c840...03.exe
windows10-2004-x64
103ae8cc733e...e3.exe
windows10-2004-x64
103ff87c5bd0...30.exe
windows10-2004-x64
104157cda315...a6.exe
windows10-2004-x64
105f318080c6...ea.exe
windows10-2004-x64
10620f9ee1b4...8f.exe
windows10-2004-x64
106817354347...3a.exe
windows10-2004-x64
10753cdc12b9...91.exe
windows10-2004-x64
10a4215d26b6...74.exe
windows10-2004-x64
10a4375e040f...82.exe
windows10-2004-x64
10a619ae77d5...2e.exe
windows10-2004-x64
10aaab139650...12.exe
windows10-2004-x64
10aefec08eba...49.exe
windows10-2004-x64
10d12f5fa25c...70.exe
windows10-2004-x64
7e5b42981fd...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
0314c3cf5875f5a348b62f28e53ec17a9180933fb126d66b7184ebbc62e3c362.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
367729c84050746eb20cd233e6b8d8cfe0625110da6e43f4b4c486aa19d08103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
3ff87c5bd0d476dfc954d3706672474698d1e412030e6189e037c2474b97b730.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
4157cda3159c7d2c99d18138d2e023dd1d821d09ae77e78901a80b26492981a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
5f318080c6c0aef583c575f49bd61e9b4e8b6784f4c52b512e9c07090e4cedea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
620f9ee1b442855f9904f5108cf7185b16d0acbacad9aaa076f02e0ffd4f588f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
753cdc12b984ece991f2018329d37985ee627640895e2d9b9a43a13a6dd6fb91.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
a4375e040f13128a4dc747d845dd82b7204008c71beb526483b369eea30d2582.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
a619ae77d542717361e631ceb6fe3fab295af4ccef45ae4774b92a9355b6bb2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d12f5fa25c8ef0ae322be4daa1b08acf499c9d1be60c2f8d6f6b5a65c28f0a70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e5b42981fd5d352478cd9e79d582bc92295cb43d3d32dfd59e84008eb4216c65.exe
Resource
win10v2004-20240426-en
General
-
Target
1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe
-
Size
1.5MB
-
MD5
a40e62a544268214b09a8bafb68847b3
-
SHA1
9f388d46aed84dde179dc1e7c037d4a2a2cfadd4
-
SHA256
1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f
-
SHA512
11a2ca05e5b202af547b8ff9960346100477e9fac8089ab467edde417b0f8c2b2ce3c5234118f1e34cc6d3abbd32a19513430505767118b1c2ef7daed5694741
-
SSDEEP
24576:SyF/ldc9xGt1TuqHUtf/bo1JtIANdz3esqRTqzred7WEB2w6FR26Ph4e3lu:5Fj/tsqmM1J9zeGzrg7WaoFR265
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral3/memory/3308-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral3/memory/3308-40-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral3/memory/3308-37-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral3/files/0x0007000000023442-38.dat family_redline behavioral3/memory/1492-42-0x0000000000170000-0x00000000001AE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4496 tH2co1FC.exe 1012 CN9MA4tK.exe 5092 gB5gp0XT.exe 888 vx5sP5GW.exe 4064 1OM15jR1.exe 1492 2jy244Sd.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" CN9MA4tK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gB5gp0XT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vx5sP5GW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tH2co1FC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4064 set thread context of 3308 4064 1OM15jR1.exe 98 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 388 wrote to memory of 4496 388 1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe 83 PID 388 wrote to memory of 4496 388 1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe 83 PID 388 wrote to memory of 4496 388 1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe 83 PID 4496 wrote to memory of 1012 4496 tH2co1FC.exe 84 PID 4496 wrote to memory of 1012 4496 tH2co1FC.exe 84 PID 4496 wrote to memory of 1012 4496 tH2co1FC.exe 84 PID 1012 wrote to memory of 5092 1012 CN9MA4tK.exe 86 PID 1012 wrote to memory of 5092 1012 CN9MA4tK.exe 86 PID 1012 wrote to memory of 5092 1012 CN9MA4tK.exe 86 PID 5092 wrote to memory of 888 5092 gB5gp0XT.exe 87 PID 5092 wrote to memory of 888 5092 gB5gp0XT.exe 87 PID 5092 wrote to memory of 888 5092 gB5gp0XT.exe 87 PID 888 wrote to memory of 4064 888 vx5sP5GW.exe 89 PID 888 wrote to memory of 4064 888 vx5sP5GW.exe 89 PID 888 wrote to memory of 4064 888 vx5sP5GW.exe 89 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 4064 wrote to memory of 3308 4064 1OM15jR1.exe 98 PID 888 wrote to memory of 1492 888 vx5sP5GW.exe 99 PID 888 wrote to memory of 1492 888 vx5sP5GW.exe 99 PID 888 wrote to memory of 1492 888 vx5sP5GW.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe"C:\Users\Admin\AppData\Local\Temp\1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tH2co1FC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tH2co1FC.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CN9MA4tK.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CN9MA4tK.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gB5gp0XT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gB5gp0XT.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vx5sP5GW.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vx5sP5GW.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1OM15jR1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1OM15jR1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2jy244Sd.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2jy244Sd.exe6⤵
- Executes dropped EXE
PID:1492
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53e1886ccac2d4113b93e4cf4c58834cb
SHA18b3516752108e59adfb044f43ce8eb915283b20d
SHA25662a388882d2b95dc3153e29963338659fda3ab661c9bd305260e835160bbbb59
SHA51228dc65ef383c5da6a449f58912788381203804ecb691a4cd34c9ea6e4d88a16ceb077e98641580df7e6884546d9e7632886e42ae2b273514240aaa0b7161ca38
-
Filesize
1.2MB
MD5c85b5db057b1b1ac57693980710d0db1
SHA18d147ac154ee46277f40ec5a7591a627f715ae6b
SHA2567f904eb337a3a5b5694a4aa1854ded3c5c733903478d8e2ca3e66607b29c8ce7
SHA5129facb9380bc68641faa2c37ee6195976dc8d6c843f05796e7b2540f3a5d2803b1e9bf24e480e4095d940d829552872c3e7c6ce3f6f0fe5b9e6551dad685e5b78
-
Filesize
776KB
MD517efd1bf08c7cbc19e4cbdf91b5cfbf6
SHA195badcbd7e8ddd197bda53b0eeb5f24586220c97
SHA25695c5eb4fce4722e11b45e6fbe35059c47122cc7021750804a7190e3b727bd4bf
SHA512520aba90ea531358ce87951f6059f116d211502f57d1e805b70c516d32e35b7724f854ff92a4e76e6015e4065dcf721b93c60116a6cecdae7ce87916b37f6f60
-
Filesize
580KB
MD5640ff896179f008597c934d9ef9e47a8
SHA137c2a00972333d2968e2c51062872075b5cac035
SHA256776c2fe4aa118604bd47b501879f31be90bffa1f1c2d76f32571b5bac0ec9582
SHA5120b7cf76c59f33d48a376ed4336932439055ae8883aae83c4d6e7f8967dc3aa290c2e09cf56903cc38c193d056ada1105a580480d8c8e77d34e9ea88631f3073e
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc
-
Filesize
222KB
MD544a99e0fba58e49e0fb25112331a5449
SHA129050a61669a2ab02a509b3f5742e831f33d1aeb
SHA25614575b62c3dcf93f029f241d4ff0b9ee2fad78f21e604cf9ce7a34b99ad9143e
SHA51272a4c2c6e8e9aa0cef08ea61c1e3af79f5cb296673ceafd73b602e8d4ec473c099b7b53666b3487b1e6da5b46e8ca8413d42d363554f7a3efd098732976c8df5