Overview
overview
10Static
static
32681e868e3...01.exe
windows10-2004-x64
10446a34b8c4...be.exe
windows10-2004-x64
10472b4c438a...4d.exe
windows7-x64
10472b4c438a...4d.exe
windows10-2004-x64
104bd9740942...ae.exe
windows10-2004-x64
10522ef7ed5d...cb.exe
windows10-2004-x64
78682bf8baa...91.exe
windows10-2004-x64
1088242c8054...22.exe
windows10-2004-x64
108f02e0ba42...1b.exe
windows10-2004-x64
1097f490d9d1...9d.exe
windows10-2004-x64
10982ac80dc3...af.exe
windows10-2004-x64
109cef0fe263...ed.exe
windows10-2004-x64
10a35e73743d...46.exe
windows10-2004-x64
10abb426fc0b...a0.exe
windows10-2004-x64
7b108a8edf9...f5.exe
windows10-2004-x64
10b654b42011...45.exe
windows10-2004-x64
10cb020fc0d9...1b.exe
windows10-2004-x64
10d2da12ea26...83.exe
windows10-2004-x64
10efd69f2941...a6.exe
windows10-2004-x64
10f093fc4510...2a.exe
windows10-2004-x64
10fde0e8258c...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
2681e868e36ec912cf14855e552a41583eb47da1464ad71b64ddaae780d63101.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
446a34b8c4e3ca30c5f6c10a03580a59127ae30d85ec80832cfadf9d862cd1be.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
472b4c438a30ae51bf83b08a063b74c043ceb6bb1706403bef38aa3a9afbda4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
472b4c438a30ae51bf83b08a063b74c043ceb6bb1706403bef38aa3a9afbda4d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4bd974094233a10e7da32c9aadcee1df6ea2adcf713f0732f2dd1d84d4252fae.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
522ef7ed5dee9a88fd0e157cf30caee38b2797c64e4d3e150f0e618147156bcb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8682bf8baac5da4e90ff3187b5fc619cdce2926723cce0ce1ee89e8e97a5b391.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
8f02e0ba4295116b4506be32206118a19a6184f5b2d4d67ce0083cc2c5a6da1b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
97f490d9d1c823988c616ede167b8b5d5f9889ef21b76a0949bcce168c71839d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
982ac80dc3c29453250a0bd0e8cb19fcf14d9871dfc2fc8d4363fb7dad5533af.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9cef0fe263b3b13bc92f18dffbc2e953559059a4fe8a44f0d4f1697e6d96b2ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a35e73743d1c4e1fc0961c56137fb8d5b74b8a9eb7287318325f458bcc36a546.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
abb426fc0b0227ef36280f0fdd020d1002e8fc1cf2fb7ca9671fc228e16a02a0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
b108a8edf956b42b12ea1c64e4706dd94bb85d9796bbc155ff54e0cc26578df5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b654b420110d68633e1d1bfec8f7c1721db51174713f79737cd5cbbef252d545.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
cb020fc0d9bc2f1a1038f879535d484db85fe92edd2562e714b41c91bcabf01b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d2da12ea26f60abee3e9f52ebc6e9f23f98b160617869929d39c982b93a45483.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
efd69f29417bb970bec5a1d5dfc3e5df6b59d154e0f68a0c8d05cc37a6e6d0a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f093fc45108d6daee0e2bbf5016feeaad7009b841c3db1005b2e45a282ee932a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
fde0e8258ce7f85dd1a300cd7964ca02580d162769083c1df9c9dcbbe96d9678.exe
Resource
win10v2004-20240508-en
General
-
Target
88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe
-
Size
1.5MB
-
MD5
0fe2284542243f32ff3335d14cb3a1c1
-
SHA1
d9bc23510c407ef9bb332b221ac74f34856d971d
-
SHA256
88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22
-
SHA512
e11a9ab4453e50b913d43a06ef7c37391169932e380354b6251dffd325c75a6c6cfe6324118e681e53c35f53938a8b7251fea0000cdc2cef5ee94a6efd5963fe
-
SSDEEP
24576:CyeiDORu08MXvlRVDaMlGhfPhgjsp5tBB/W/sbrEzk3Xse:pdD8u082rdtQJPhtp57B+sbwK
Malware Config
Extracted
redline
kedru
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral8/memory/4280-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral8/memory/4280-37-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral8/memory/4280-39-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral8/files/0x0007000000023435-40.dat family_redline behavioral8/memory/3252-42-0x0000000000900000-0x000000000093C000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3232 NI8gQ6WV.exe 1668 xe1JA4kA.exe 1176 tC3Xn1MV.exe 1500 LG8dA8SQ.exe 3308 1Az08BC2.exe 3252 2Fj551Ah.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" tC3Xn1MV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" LG8dA8SQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" NI8gQ6WV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" xe1JA4kA.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3308 set thread context of 4280 3308 1Az08BC2.exe 89 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3232 3688 88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe 84 PID 3688 wrote to memory of 3232 3688 88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe 84 PID 3688 wrote to memory of 3232 3688 88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe 84 PID 3232 wrote to memory of 1668 3232 NI8gQ6WV.exe 85 PID 3232 wrote to memory of 1668 3232 NI8gQ6WV.exe 85 PID 3232 wrote to memory of 1668 3232 NI8gQ6WV.exe 85 PID 1668 wrote to memory of 1176 1668 xe1JA4kA.exe 86 PID 1668 wrote to memory of 1176 1668 xe1JA4kA.exe 86 PID 1668 wrote to memory of 1176 1668 xe1JA4kA.exe 86 PID 1176 wrote to memory of 1500 1176 tC3Xn1MV.exe 87 PID 1176 wrote to memory of 1500 1176 tC3Xn1MV.exe 87 PID 1176 wrote to memory of 1500 1176 tC3Xn1MV.exe 87 PID 1500 wrote to memory of 3308 1500 LG8dA8SQ.exe 88 PID 1500 wrote to memory of 3308 1500 LG8dA8SQ.exe 88 PID 1500 wrote to memory of 3308 1500 LG8dA8SQ.exe 88 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 3308 wrote to memory of 4280 3308 1Az08BC2.exe 89 PID 1500 wrote to memory of 3252 1500 LG8dA8SQ.exe 90 PID 1500 wrote to memory of 3252 1500 LG8dA8SQ.exe 90 PID 1500 wrote to memory of 3252 1500 LG8dA8SQ.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe"C:\Users\Admin\AppData\Local\Temp\88242c8054974baa356b72df09969ef7d9d50033497a8ec162fab5103a16aa22.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NI8gQ6WV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NI8gQ6WV.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xe1JA4kA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xe1JA4kA.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tC3Xn1MV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tC3Xn1MV.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LG8dA8SQ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LG8dA8SQ.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Az08BC2.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Az08BC2.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4280
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Fj551Ah.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Fj551Ah.exe6⤵
- Executes dropped EXE
PID:3252
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5385eddc490abbb1403bdb0b088fc5a62
SHA10f43a06fe1da97a9e6dd23d242af0b54bdf037ee
SHA25695345db80310af6d8adfb70f1305af90153f1e2d46dfe2cadd377c74c78de4fe
SHA512a197aa3bf7879b8279272cdc281749b13ca6ec3fec76a86371568a27a8b5b3fa129f76fadfa52b49c746f16972a7db059245f4c71d91468b1077413a02bb5899
-
Filesize
1.1MB
MD50eb5f52cdf04ac06a27d5677584933eb
SHA1539c21b449bb442faad0ed6f2822eb4a32ec4b09
SHA256614f8804c48d862b18aec7a141268d4f1060f3789a2e7b0c08ca301226901985
SHA512e4f94d8315a212b0e7eb452a916621d2e155766f60c79518623d0b867b8b3ba570d22ee8185dcef228ddd37cd0b609c444772595927fc72c4159d6fbe3e55cb4
-
Filesize
753KB
MD5b4b866b9bc0ca3184ee225896e747640
SHA111dfdd4d8741ef706932dd8fbd2988fda783b15c
SHA256d676553313491e8fa802aa37a6cd4db6383ca73dd050aba7ebd05b4cdf2968aa
SHA51233579cc0a283d467b37b22a5777a71b045d5e2b11df295d409901b9813f4429174e625994a844124428bb59612924067d70730f5ac1d588bdead9d088e081809
-
Filesize
558KB
MD5aab7b3919093711ca79bb8da97e5e146
SHA18dd90dda3e69682c41d771a0cfe64b050d3bece4
SHA256a34840fe2fed16e4837a7226b63cf79d6c602750242e5c14e996b157fd082417
SHA5126ede531f12b7e59426318e647de4b442c3fe727d7d923a1ddaed32ba8558180a38436bad83bd7eb7a24a0778497dd115b0a024d71b2835a9023a9ab71fe01ea0
-
Filesize
1.0MB
MD5a52dc630ad952aea92d56525abe49463
SHA171fec2ba7b37ff2c11404d8d0dabf5780607e8f8
SHA256dcf9c6f502f134ba8c70d11bfb1ba4f5549644df1bcb8f5956b509ef05b60a1f
SHA51266aa1719e65c7649464377d1cbb632709f4e7eb6af914c966fcb495ad40a9a6fb500ad2f1376841e1c5d81362b25115011bcc602dbfa1df8ab511282b71538bf
-
Filesize
219KB
MD5d9ad69bc8b28b6643c219e83403689e1
SHA15fdc6f2174bfc18bf55e493631fc7b663c0eb9bb
SHA2568ac878096fe7104de6a2746d5c5d4f2486ad0a82e2ec231a5b559262caf84733
SHA512a6e3366ca45f20f91802dda8a7512b9eda1488b0ae52b39e7088f074cd0f0267e6cf891bc7963ce44a31ee48cd985b0f0a7db741a4b7d121467c2251c52e7581