Overview
overview
10Static
static
32681e868e3...01.exe
windows10-2004-x64
10446a34b8c4...be.exe
windows10-2004-x64
10472b4c438a...4d.exe
windows7-x64
10472b4c438a...4d.exe
windows10-2004-x64
104bd9740942...ae.exe
windows10-2004-x64
10522ef7ed5d...cb.exe
windows10-2004-x64
78682bf8baa...91.exe
windows10-2004-x64
1088242c8054...22.exe
windows10-2004-x64
108f02e0ba42...1b.exe
windows10-2004-x64
1097f490d9d1...9d.exe
windows10-2004-x64
10982ac80dc3...af.exe
windows10-2004-x64
109cef0fe263...ed.exe
windows10-2004-x64
10a35e73743d...46.exe
windows10-2004-x64
10abb426fc0b...a0.exe
windows10-2004-x64
7b108a8edf9...f5.exe
windows10-2004-x64
10b654b42011...45.exe
windows10-2004-x64
10cb020fc0d9...1b.exe
windows10-2004-x64
10d2da12ea26...83.exe
windows10-2004-x64
10efd69f2941...a6.exe
windows10-2004-x64
10f093fc4510...2a.exe
windows10-2004-x64
10fde0e8258c...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
2681e868e36ec912cf14855e552a41583eb47da1464ad71b64ddaae780d63101.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
446a34b8c4e3ca30c5f6c10a03580a59127ae30d85ec80832cfadf9d862cd1be.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
472b4c438a30ae51bf83b08a063b74c043ceb6bb1706403bef38aa3a9afbda4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
472b4c438a30ae51bf83b08a063b74c043ceb6bb1706403bef38aa3a9afbda4d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4bd974094233a10e7da32c9aadcee1df6ea2adcf713f0732f2dd1d84d4252fae.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
522ef7ed5dee9a88fd0e157cf30caee38b2797c64e4d3e150f0e618147156bcb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8682bf8baac5da4e90ff3187b5fc619cdce2926723cce0ce1ee89e8e97a5b391.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
8f02e0ba4295116b4506be32206118a19a6184f5b2d4d67ce0083cc2c5a6da1b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
97f490d9d1c823988c616ede167b8b5d5f9889ef21b76a0949bcce168c71839d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
982ac80dc3c29453250a0bd0e8cb19fcf14d9871dfc2fc8d4363fb7dad5533af.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9cef0fe263b3b13bc92f18dffbc2e953559059a4fe8a44f0d4f1697e6d96b2ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
abb426fc0b0227ef36280f0fdd020d1002e8fc1cf2fb7ca9671fc228e16a02a0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
b108a8edf956b42b12ea1c64e4706dd94bb85d9796bbc155ff54e0cc26578df5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b654b420110d68633e1d1bfec8f7c1721db51174713f79737cd5cbbef252d545.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
cb020fc0d9bc2f1a1038f879535d484db85fe92edd2562e714b41c91bcabf01b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d2da12ea26f60abee3e9f52ebc6e9f23f98b160617869929d39c982b93a45483.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
efd69f29417bb970bec5a1d5dfc3e5df6b59d154e0f68a0c8d05cc37a6e6d0a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f093fc45108d6daee0e2bbf5016feeaad7009b841c3db1005b2e45a282ee932a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
fde0e8258ce7f85dd1a300cd7964ca02580d162769083c1df9c9dcbbe96d9678.exe
Resource
win10v2004-20240508-en
General
-
Target
a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe
-
Size
1.1MB
-
MD5
7db592e10da1185fdda4eb02563708fc
-
SHA1
8d2a3b604d8bbf44c44079249eaefe26b0098f24
-
SHA256
a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546
-
SHA512
379743136ec723ec66d5032089f5b4e647f95d008ef4124aeed1f4d14817456f76299358367f24d112e0c0fbd718fca3f3d2921afdfd10bbad10cbecbe1b739d
-
SSDEEP
24576:VyEGUV7+MTHaZJ0jnUzctOX6qmHHGIJKnCZtgNR75qy394mB7:w3ECMjaZqozKXhHm578yXB
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral13/memory/4376-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral13/memory/4376-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral13/memory/4376-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral13/files/0x0007000000023449-40.dat family_redline behavioral13/memory/4892-42-0x00000000008F0000-0x000000000092E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2532 pt0xA5gg.exe 3592 xg3Qg7iV.exe 1912 bZ0dl5at.exe 4416 XG4ZE3Ch.exe 2392 1gy38An0.exe 4892 2SJ436cY.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" xg3Qg7iV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" bZ0dl5at.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" XG4ZE3Ch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pt0xA5gg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 4376 2392 1gy38An0.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 3104 2392 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3916 wrote to memory of 2532 3916 a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe 83 PID 3916 wrote to memory of 2532 3916 a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe 83 PID 3916 wrote to memory of 2532 3916 a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe 83 PID 2532 wrote to memory of 3592 2532 pt0xA5gg.exe 84 PID 2532 wrote to memory of 3592 2532 pt0xA5gg.exe 84 PID 2532 wrote to memory of 3592 2532 pt0xA5gg.exe 84 PID 3592 wrote to memory of 1912 3592 xg3Qg7iV.exe 85 PID 3592 wrote to memory of 1912 3592 xg3Qg7iV.exe 85 PID 3592 wrote to memory of 1912 3592 xg3Qg7iV.exe 85 PID 1912 wrote to memory of 4416 1912 bZ0dl5at.exe 87 PID 1912 wrote to memory of 4416 1912 bZ0dl5at.exe 87 PID 1912 wrote to memory of 4416 1912 bZ0dl5at.exe 87 PID 4416 wrote to memory of 2392 4416 XG4ZE3Ch.exe 88 PID 4416 wrote to memory of 2392 4416 XG4ZE3Ch.exe 88 PID 4416 wrote to memory of 2392 4416 XG4ZE3Ch.exe 88 PID 2392 wrote to memory of 4756 2392 1gy38An0.exe 92 PID 2392 wrote to memory of 4756 2392 1gy38An0.exe 92 PID 2392 wrote to memory of 4756 2392 1gy38An0.exe 92 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 2392 wrote to memory of 4376 2392 1gy38An0.exe 93 PID 4416 wrote to memory of 4892 4416 XG4ZE3Ch.exe 97 PID 4416 wrote to memory of 4892 4416 XG4ZE3Ch.exe 97 PID 4416 wrote to memory of 4892 4416 XG4ZE3Ch.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe"C:\Users\Admin\AppData\Local\Temp\a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pt0xA5gg.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pt0xA5gg.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xg3Qg7iV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xg3Qg7iV.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bZ0dl5at.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bZ0dl5at.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\XG4ZE3Ch.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\XG4ZE3Ch.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1gy38An0.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1gy38An0.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 6127⤵
- Program crash
PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2SJ436cY.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2SJ436cY.exe6⤵
- Executes dropped EXE
PID:4892
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2392 -ip 23921⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1001KB
MD53bcb31f40a40e1f6cae84c5bea0f4470
SHA11439d8e0f7733ffaada435198257d17e640c01c8
SHA256ed23696f9dd547f54c9ecd3de7c34ca6a50a0fadd70b83d803f8ade444acae27
SHA51226245199b012af52ef4aa765ce26f0db11a198fed06f4ee06ebb7e7f0e23c4bbe955329c327fb248269f23dc176831f951ecfee95a5efe88cb915699132c3a20
-
Filesize
812KB
MD53fc4f5128feba784657f0bb9174684f6
SHA1a1d06ce2bb1aee90467afe37b2708ee3f91fff05
SHA256be72aa2daa129607dfa5eebe89c8ddb1ba649f9f99e03ae724f4085be52da691
SHA5129fd1f7d9f5311cee450d48bdcba2424482c34009bc1636ac6bdfefefccdc3218080217e4105cde5eb3fe2ddc77b8d288aa8b0a84057f5de0b246a5824039aa82
-
Filesize
578KB
MD5d6836f91110230e07b0874f3cc8eac53
SHA14caa911e5f6233fa11fe1a7434ec2db844f60e9e
SHA256beaf0e795c7a78cf487c625c73793bdf9dcc6650727f1c55af7584ea65a7e040
SHA512278aeee5dc58d13aae64f20ff571b1817283957a84c7e0804f128e2c2f2644816d01f19ffa05b19113450ee2727cd75eaab2b5d487317fc12b7938554b5c1792
-
Filesize
382KB
MD5f282e18e7b52a2e5f954efbd882e2460
SHA187c24a707dd7f6140e5bb89ef84e327b38c10a7c
SHA25662f0d504b88191473b59e183309cf71de1e94ade592178403d6ddb0c2571f6da
SHA5120b7abe61ee3d9b739b2ac7fe038e1b65cef246ffad6feb0856e49e59c0f42cb4df0ed2e8973afa83b74a3e612ade227a315e9a4154fb80ab0d94ace3cca54a12
-
Filesize
295KB
MD56037d6e4808ee1664d2cf30357fcd115
SHA12f9350cb1db4521e5e638c86d0f5fa090ccbef09
SHA25613093d33e27095af57e49c7ee29c4b85da53c3286ee1175a4b29ab7545538a1f
SHA51218e1bb1cc04b3f053d20d29cf19d388c8f75833399c6d46e785f813f3a3edd2bfc26895571862f364d6c4cbfdc558c1be615a0615b641a8c7806bc4056b263da
-
Filesize
222KB
MD5ddc418056cede0abd049b9f489adeee2
SHA15f3711db9bc61102322b5d859bd988416de2f845
SHA2566c88a89541d23f2858e4ea4d8cc3b239d405306c35258d2aafbbcebfbd4e0b87
SHA512e66d85f1821eb945339718a14f888e3d666b48300d98ed2ba30c0cd2e89f90d890340ae8aebc9d89594f80020fcec642a3aea16d6aec794bd28708deff4dd5f8