Overview
overview
10Static
static
3028b296453...a5.exe
windows10-2004-x64
100ebae60c47...a6.exe
windows10-2004-x64
103ae03a392f...c7.exe
windows10-2004-x64
1049eb2b419a...61.exe
windows7-x64
1049eb2b419a...61.exe
windows10-2004-x64
104bb1d789df...b2.exe
windows10-2004-x64
104c0305778b...7c.exe
windows10-2004-x64
1056d014c086...70.exe
windows10-2004-x64
1064572328af...7c.exe
windows10-2004-x64
1068546b0231...3b.exe
windows10-2004-x64
10756d67f0f1...0a.exe
windows10-2004-x64
1088fc008066...39.exe
windows7-x64
1088fc008066...39.exe
windows10-2004-x64
108ab296834f...ad.exe
windows10-2004-x64
10903d5eea2e...ff.exe
windows10-2004-x64
10a667459185...08.exe
windows10-2004-x64
10b42e87afb8...84.exe
windows10-2004-x64
10cdc820df4b...04.exe
windows10-2004-x64
10d52db86881...86.exe
windows10-2004-x64
10e17fa1b4c1...2e.exe
windows10-2004-x64
10f068aa20f8...e6.exe
windows10-2004-x64
7f3bbfb34ef...1c.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
028b2964534ec73672e940b1d39800c01228ab40cfa923a7921d7726c68878a5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
3ae03a392f3a264a9e73fa7a83c2de0795f5a49d845443f755496373bc4c0dc7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
49eb2b419a7fbc0c025450733e242f86ec67d7f11aff4c830eafc3484cd72561.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
49eb2b419a7fbc0c025450733e242f86ec67d7f11aff4c830eafc3484cd72561.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4bb1d789dfda1e41c8f39182a3f53a19e105cde455b57f94c5c65eb9ffd566b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
56d014c086bdbb8e6727c4aa360408eb457604ca6d788375c3e76d1fc1282a70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
64572328af55ddb39cf319f821a90aece83e1a0289c4066f72b87935030d767c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
68546b0231d09cc911cb999b99aac50e0886e7fb2a15f9838196cd1b969eed3b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
756d67f0f1a9eb3ecd9811aa2645969a0399a6904fc24c012eb08d2a0496b50a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
88fc008066b2101015f65df21f2a0732a15470f31c4692048176dd67b4d25039.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
88fc008066b2101015f65df21f2a0732a15470f31c4692048176dd67b4d25039.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
8ab296834f82cfcc09d242ca9b14991f94e5b8578e693e18cddc6e18583575ad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
903d5eea2e039a18d476d0f8eed04db2ebab7584fcc8eda779901b4ecd592eff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a667459185406132f726b24ab0a1ee46efda6669c577f3f34cccd16abd51a708.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
b42e87afb8e78889d83796798a5b481717e3a8e055b712f3be843dc5251b5084.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cdc820df4bc752f27ec02df80d490eb873cb293ebe295e0d73f95622ef6b0d04.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
d52db8688155f5960af607ea116cac7310719b971ef7efd19f34585b6431d286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f068aa20f8123496a540be006d669b95cd194e7c2d6d86bc3c0a956326dd01e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe
Resource
win10v2004-20240426-en
General
-
Target
f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe
-
Size
843KB
-
MD5
46a6de119fb7256f7b36b70546344387
-
SHA1
804612a43e20322bf716a5216acb850eaad6e4a9
-
SHA256
f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c
-
SHA512
73c0537f973210d5a5e882ed55fb19a9af7cc0dc7af39bcb217d6fbc6a8f6cffc542d50c34b9a88a74846147d414a511d9ef3f4330cc819f140e2fa6f4be38d9
-
SSDEEP
24576:oyivJjEUyx3voeZA+GMGA9NSm/b7XAh5vE0f:v9tx3vtAnMdNas0
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral22/memory/808-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral22/memory/808-25-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral22/memory/808-23-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral22/memory/808-22-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral22/files/0x0007000000023427-27.dat family_redline behavioral22/memory/4236-29-0x00000000002B0000-0x00000000002EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3692 Se5Ab9Fb.exe 3144 SM9dc2Wm.exe 668 1lN98Qa3.exe 4236 2Qi161ee.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Se5Ab9Fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" SM9dc2Wm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 668 set thread context of 808 668 1lN98Qa3.exe 102 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3692 1920 f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe 83 PID 1920 wrote to memory of 3692 1920 f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe 83 PID 1920 wrote to memory of 3692 1920 f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe 83 PID 3692 wrote to memory of 3144 3692 Se5Ab9Fb.exe 84 PID 3692 wrote to memory of 3144 3692 Se5Ab9Fb.exe 84 PID 3692 wrote to memory of 3144 3692 Se5Ab9Fb.exe 84 PID 3144 wrote to memory of 668 3144 SM9dc2Wm.exe 85 PID 3144 wrote to memory of 668 3144 SM9dc2Wm.exe 85 PID 3144 wrote to memory of 668 3144 SM9dc2Wm.exe 85 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 668 wrote to memory of 808 668 1lN98Qa3.exe 102 PID 3144 wrote to memory of 4236 3144 SM9dc2Wm.exe 103 PID 3144 wrote to memory of 4236 3144 SM9dc2Wm.exe 103 PID 3144 wrote to memory of 4236 3144 SM9dc2Wm.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe"C:\Users\Admin\AppData\Local\Temp\f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Se5Ab9Fb.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Se5Ab9Fb.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SM9dc2Wm.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SM9dc2Wm.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1lN98Qa3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1lN98Qa3.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Qi161ee.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Qi161ee.exe4⤵
- Executes dropped EXE
PID:4236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD504d2f998e3c78e80cce8609f79ee899b
SHA172c1fd7e24402b1058bd78bc2d1f38fb8e1a02eb
SHA256882c4f72dbbf94af8121e976f60da95b09ce0f67eb2f61b2cacacac0848d3b24
SHA512a11d2e0e31f5ae64b6be6f8ff71d5981bf3946826144cf0071fa8312bb199a3c4d95c9c31f068d4efb5c98656c34763b8f05eb06f93de383301add61dd04b870
-
Filesize
398KB
MD5ed74b7d2f38d02fe700050c99cb36a34
SHA19f70de79d4c634a25084fc9258f662f455c392ef
SHA2568a67009aae3c7621d7596d8b67ce830d1f119d507f015725acd529d51e18bba6
SHA512877f5247d1961be2cb112552e831a4a3bd3e707e3475cb85d240d16e4d080e9a45d96e798699b13c4b3d5a517cff904df1c607a40aa559abbaf16d5802eca291
-
Filesize
320KB
MD523052ce48929f15c04d09f4a3f8da316
SHA1ffc59e3138ddae8bd1efa5aab5b96bbe1a35cf16
SHA2567354486fbe8b4cf1c2fa05276c7e1ebdd0b5bab9db10559976ef97c061682874
SHA51216a174a591fa66dc676eba14cbc22db9e2178798b6afce8492f6a16456666ca9a2f674fb41d0e483ce7b3eb44a99c01ff3b81484470ef33793466e1df825e29a
-
Filesize
222KB
MD5debf60abc8d2cb6b4857c27c94b729ad
SHA1b73c9194588637d353904496d07de13f8ff45540
SHA2566dc7b8ae9f8458ae2314f18860ae62c451a41359dd09f1347ae6da7cafd05aba
SHA512f8eede70047a7219f335e6b0adef2c871113779c37618c27566d585e7902c82ecda06bed2a962b5f9e704a4fad2394fde158cd6abe0b856690616a0503e5c7b6