Overview
overview
10Static
static
3028b296453...a5.exe
windows10-2004-x64
100ebae60c47...a6.exe
windows10-2004-x64
103ae03a392f...c7.exe
windows10-2004-x64
1049eb2b419a...61.exe
windows7-x64
1049eb2b419a...61.exe
windows10-2004-x64
104bb1d789df...b2.exe
windows10-2004-x64
104c0305778b...7c.exe
windows10-2004-x64
1056d014c086...70.exe
windows10-2004-x64
1064572328af...7c.exe
windows10-2004-x64
1068546b0231...3b.exe
windows10-2004-x64
10756d67f0f1...0a.exe
windows10-2004-x64
1088fc008066...39.exe
windows7-x64
1088fc008066...39.exe
windows10-2004-x64
108ab296834f...ad.exe
windows10-2004-x64
10903d5eea2e...ff.exe
windows10-2004-x64
10a667459185...08.exe
windows10-2004-x64
10b42e87afb8...84.exe
windows10-2004-x64
10cdc820df4b...04.exe
windows10-2004-x64
10d52db86881...86.exe
windows10-2004-x64
10e17fa1b4c1...2e.exe
windows10-2004-x64
10f068aa20f8...e6.exe
windows10-2004-x64
7f3bbfb34ef...1c.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
028b2964534ec73672e940b1d39800c01228ab40cfa923a7921d7726c68878a5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
3ae03a392f3a264a9e73fa7a83c2de0795f5a49d845443f755496373bc4c0dc7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
49eb2b419a7fbc0c025450733e242f86ec67d7f11aff4c830eafc3484cd72561.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
49eb2b419a7fbc0c025450733e242f86ec67d7f11aff4c830eafc3484cd72561.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4bb1d789dfda1e41c8f39182a3f53a19e105cde455b57f94c5c65eb9ffd566b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
56d014c086bdbb8e6727c4aa360408eb457604ca6d788375c3e76d1fc1282a70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
64572328af55ddb39cf319f821a90aece83e1a0289c4066f72b87935030d767c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
68546b0231d09cc911cb999b99aac50e0886e7fb2a15f9838196cd1b969eed3b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
756d67f0f1a9eb3ecd9811aa2645969a0399a6904fc24c012eb08d2a0496b50a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
88fc008066b2101015f65df21f2a0732a15470f31c4692048176dd67b4d25039.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
88fc008066b2101015f65df21f2a0732a15470f31c4692048176dd67b4d25039.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
8ab296834f82cfcc09d242ca9b14991f94e5b8578e693e18cddc6e18583575ad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
903d5eea2e039a18d476d0f8eed04db2ebab7584fcc8eda779901b4ecd592eff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a667459185406132f726b24ab0a1ee46efda6669c577f3f34cccd16abd51a708.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
b42e87afb8e78889d83796798a5b481717e3a8e055b712f3be843dc5251b5084.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cdc820df4bc752f27ec02df80d490eb873cb293ebe295e0d73f95622ef6b0d04.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
d52db8688155f5960af607ea116cac7310719b971ef7efd19f34585b6431d286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f068aa20f8123496a540be006d669b95cd194e7c2d6d86bc3c0a956326dd01e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe
Resource
win10v2004-20240426-en
General
-
Target
e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe
-
Size
819KB
-
MD5
cdb92ed4f80ad1af3433a407fa466fa1
-
SHA1
175e95f65a3419b18ec55532268662d26b4e72eb
-
SHA256
e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e
-
SHA512
00b10eabe8780be719a647988cad690bc5796b7d57f20964849753a6da230a6ae63c655bb1f4da288caa54f540110d3dbedcbf360c2b7a31d3880930c200d2ec
-
SSDEEP
24576:syGB/OVfuMjv3yMFmTrIti5gqZKN4jYI:b6OVD9oTe2gqQNiY
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral20/memory/864-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral20/memory/864-22-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral20/memory/864-25-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral20/memory/864-23-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral20/files/0x0007000000023455-26.dat family_redline behavioral20/memory/2356-29-0x0000000000840000-0x000000000087E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2732 Rm7EP0Ay.exe 1208 ll7mc0TW.exe 1056 1dy17Ol5.exe 2356 2jA995CP.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Rm7EP0Ay.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ll7mc0TW.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1056 set thread context of 864 1056 1dy17Ol5.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 3908 1056 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2732 3040 e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe 82 PID 3040 wrote to memory of 2732 3040 e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe 82 PID 3040 wrote to memory of 2732 3040 e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe 82 PID 2732 wrote to memory of 1208 2732 Rm7EP0Ay.exe 83 PID 2732 wrote to memory of 1208 2732 Rm7EP0Ay.exe 83 PID 2732 wrote to memory of 1208 2732 Rm7EP0Ay.exe 83 PID 1208 wrote to memory of 1056 1208 ll7mc0TW.exe 84 PID 1208 wrote to memory of 1056 1208 ll7mc0TW.exe 84 PID 1208 wrote to memory of 1056 1208 ll7mc0TW.exe 84 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1056 wrote to memory of 864 1056 1dy17Ol5.exe 97 PID 1208 wrote to memory of 2356 1208 ll7mc0TW.exe 101 PID 1208 wrote to memory of 2356 1208 ll7mc0TW.exe 101 PID 1208 wrote to memory of 2356 1208 ll7mc0TW.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe"C:\Users\Admin\AppData\Local\Temp\e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rm7EP0Ay.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rm7EP0Ay.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ll7mc0TW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ll7mc0TW.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1dy17Ol5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1dy17Ol5.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 5565⤵
- Program crash
PID:3908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2jA995CP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2jA995CP.exe4⤵
- Executes dropped EXE
PID:2356
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1056 -ip 10561⤵PID:516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
584KB
MD50263d4e41fbb4a723528c286275053c3
SHA16813970544159675b2310f602f9e7b5510cf3833
SHA25637b6882042f0c7ef99e38485f469c476afc09b8bfcfc338bb7b25a51b09f6daa
SHA51255074b82d24706a8ad57f7fe1279bd7b65f5d7f0790ab738f36ec2edce6d567bdce9219ba0894713601059c9cc72075af71390f2abd5cf545a1bb8a9d6660782
-
Filesize
383KB
MD5107e8943cd467a554ca53583052d60b3
SHA144ca8b8d860ab04af0a2a515808fcdc7abfc7c83
SHA25698b06c140d2ccc1f5b033611d263d2d744c89ae7398539a08f2189772523a778
SHA5126a812c4b484ab8dbacdf408541477af6a7732fb9ce1f8ebbda9a238994edf56cf9a4f19aae6b2b50d4ab3fe8eb2529674521a852ff7fd09a143ad44ae1f3b5f9
-
Filesize
298KB
MD5d5b82c62d22c42db4d9e0f748442b2a1
SHA13efb5f9a27cf424e2de783db79d6dfa26204489d
SHA2562e82a58fe10d31b8da6f746789dd03d9d3eade1acb40b0c628d6d3b768b519bf
SHA5124d8b7fc9355a5e45c512e10b1d7cf018a8432a4d78143001e964189f92507888cebbbd1f20e89078f5b0b1211a41904635165bdd7bd98850206a1b3fe98087d9
-
Filesize
222KB
MD5ad6394b9b9cf9418c2e3a4314b8d8650
SHA1ef9352deb7a0ec5e96a95b84c2622da6bf86890f
SHA25624725f7b4de42aa50ae6a8dc757cc01362c454736cb724bf926eb0e68638c92a
SHA5127a6efea906c80505b2906ff8c8cf7e540a6bd813d12130635b8ce26e96b2fc63e9fbcc52671a409ef2c5167d11ab817c6c67fc3e37d95b083d65819fd74f0843