Overview
overview
10Static
static
3028b296453...a5.exe
windows10-2004-x64
100ebae60c47...a6.exe
windows10-2004-x64
103ae03a392f...c7.exe
windows10-2004-x64
1049eb2b419a...61.exe
windows7-x64
1049eb2b419a...61.exe
windows10-2004-x64
104bb1d789df...b2.exe
windows10-2004-x64
104c0305778b...7c.exe
windows10-2004-x64
1056d014c086...70.exe
windows10-2004-x64
1064572328af...7c.exe
windows10-2004-x64
1068546b0231...3b.exe
windows10-2004-x64
10756d67f0f1...0a.exe
windows10-2004-x64
1088fc008066...39.exe
windows7-x64
1088fc008066...39.exe
windows10-2004-x64
108ab296834f...ad.exe
windows10-2004-x64
10903d5eea2e...ff.exe
windows10-2004-x64
10a667459185...08.exe
windows10-2004-x64
10b42e87afb8...84.exe
windows10-2004-x64
10cdc820df4b...04.exe
windows10-2004-x64
10d52db86881...86.exe
windows10-2004-x64
10e17fa1b4c1...2e.exe
windows10-2004-x64
10f068aa20f8...e6.exe
windows10-2004-x64
7f3bbfb34ef...1c.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
028b2964534ec73672e940b1d39800c01228ab40cfa923a7921d7726c68878a5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
3ae03a392f3a264a9e73fa7a83c2de0795f5a49d845443f755496373bc4c0dc7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
49eb2b419a7fbc0c025450733e242f86ec67d7f11aff4c830eafc3484cd72561.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
49eb2b419a7fbc0c025450733e242f86ec67d7f11aff4c830eafc3484cd72561.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4bb1d789dfda1e41c8f39182a3f53a19e105cde455b57f94c5c65eb9ffd566b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
56d014c086bdbb8e6727c4aa360408eb457604ca6d788375c3e76d1fc1282a70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
64572328af55ddb39cf319f821a90aece83e1a0289c4066f72b87935030d767c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
68546b0231d09cc911cb999b99aac50e0886e7fb2a15f9838196cd1b969eed3b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
756d67f0f1a9eb3ecd9811aa2645969a0399a6904fc24c012eb08d2a0496b50a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
88fc008066b2101015f65df21f2a0732a15470f31c4692048176dd67b4d25039.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
88fc008066b2101015f65df21f2a0732a15470f31c4692048176dd67b4d25039.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
8ab296834f82cfcc09d242ca9b14991f94e5b8578e693e18cddc6e18583575ad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
903d5eea2e039a18d476d0f8eed04db2ebab7584fcc8eda779901b4ecd592eff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a667459185406132f726b24ab0a1ee46efda6669c577f3f34cccd16abd51a708.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
b42e87afb8e78889d83796798a5b481717e3a8e055b712f3be843dc5251b5084.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cdc820df4bc752f27ec02df80d490eb873cb293ebe295e0d73f95622ef6b0d04.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
d52db8688155f5960af607ea116cac7310719b971ef7efd19f34585b6431d286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f068aa20f8123496a540be006d669b95cd194e7c2d6d86bc3c0a956326dd01e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe
Resource
win10v2004-20240426-en
General
-
Target
4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe
-
Size
1.1MB
-
MD5
4e9a064fd09528f5303170e09f4a9915
-
SHA1
660aba6a4f542e455c1c03d064a6a5d0f03f242b
-
SHA256
4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c
-
SHA512
dd16cf7e646bfb424d34de2ba2cb552f0ca987ab7f05e4e5fc02f0121cdcc64516a6f55205d30c8989c01b685cfffe6a5024dd939edcb5f394090fd6440f0ec5
-
SSDEEP
24576:wyEcwtFE7Dovi0Qy5knZeVw4dCsgjWLbFuap2FXSBmIQHg:3EcSmfoa0QyiZ34csv2FiUV
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral7/files/0x000800000002342c-33.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral7/files/0x000700000002342d-36.dat family_redline behavioral7/memory/3860-38-0x00000000004C0000-0x00000000004FE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 8 gX7Zm6Gs.exe 3240 Ub1Pu2Xt.exe 4772 sp2Zh2SH.exe 3472 dU7jF6bO.exe 3624 1Py64PZ7.exe 3860 2zY069an.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gX7Zm6Gs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ub1Pu2Xt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" sp2Zh2SH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" dU7jF6bO.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3576 wrote to memory of 8 3576 4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe 83 PID 3576 wrote to memory of 8 3576 4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe 83 PID 3576 wrote to memory of 8 3576 4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe 83 PID 8 wrote to memory of 3240 8 gX7Zm6Gs.exe 84 PID 8 wrote to memory of 3240 8 gX7Zm6Gs.exe 84 PID 8 wrote to memory of 3240 8 gX7Zm6Gs.exe 84 PID 3240 wrote to memory of 4772 3240 Ub1Pu2Xt.exe 85 PID 3240 wrote to memory of 4772 3240 Ub1Pu2Xt.exe 85 PID 3240 wrote to memory of 4772 3240 Ub1Pu2Xt.exe 85 PID 4772 wrote to memory of 3472 4772 sp2Zh2SH.exe 87 PID 4772 wrote to memory of 3472 4772 sp2Zh2SH.exe 87 PID 4772 wrote to memory of 3472 4772 sp2Zh2SH.exe 87 PID 3472 wrote to memory of 3624 3472 dU7jF6bO.exe 88 PID 3472 wrote to memory of 3624 3472 dU7jF6bO.exe 88 PID 3472 wrote to memory of 3624 3472 dU7jF6bO.exe 88 PID 3472 wrote to memory of 3860 3472 dU7jF6bO.exe 89 PID 3472 wrote to memory of 3860 3472 dU7jF6bO.exe 89 PID 3472 wrote to memory of 3860 3472 dU7jF6bO.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe"C:\Users\Admin\AppData\Local\Temp\4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gX7Zm6Gs.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gX7Zm6Gs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ub1Pu2Xt.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ub1Pu2Xt.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sp2Zh2SH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sp2Zh2SH.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dU7jF6bO.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dU7jF6bO.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Py64PZ7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Py64PZ7.exe6⤵
- Executes dropped EXE
PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2zY069an.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2zY069an.exe6⤵
- Executes dropped EXE
PID:3860
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1005KB
MD5b906b8f0a83a778b6ae4a1fc58c5b0a6
SHA128a4cae041215a53dd1ae0f9b194001571ef4a27
SHA256ccb4c557adf5eca8e74ea28d10813118076d655fdd2677a8cb0133b2ccd8711c
SHA51255b23478b3a5f4c76342c144aedd1131ae5dbaf7f4a6547ca97c568d6e07ab8dcd90cdf3d3efd7b144b24dab0d5f209a24ef34e237f6dffa0ac8cc06bc440e17
-
Filesize
816KB
MD58e02494bb3dacb883250585c26e5d2c8
SHA1ae0cf9633d1b0146358522bbc19f57d50f36a3ce
SHA25632a84b5aa989f0b443cf24c175b8dc5d507d12a6282eac3b12e0ae05801db7dd
SHA512b67762558b6a66c9d88b370ae86b67001d2f75822362d9327bc82e59c01b44f33110e3bc4c25939811b6447540e7a4f2b54d642a04af788dd0b47cab3a27f27e
-
Filesize
522KB
MD530be969576a942a5b9eb4f2847c8659b
SHA18d14a261cceacabddfd73e34dbfb9c45bf6e58d3
SHA256668679f85838b5faa5d271e648e436aa19f354b27ab4fa6c981b40d9ee1cd54d
SHA5123e46c7c5d8387db57fa4ddfa8db286f1c5db38c88cb2ac2b3afed1e5286818facad4814e61d3c47beaf6c1fcda61c9341554e51e4b3674ecfe8ec9c708b1de1a
-
Filesize
326KB
MD5d7f8d34c614001be1d4e5f48fdd96c7c
SHA1edb98c61f04363907f69240e9a2fe92cd9529290
SHA2561e944b144765084fcfa1f63d0cf7161d44b6cd7c9285bd7c83ead9e89066a2a5
SHA512f4798003d418b3287fd72b04b7340889512caccfc52155564969bdd26ef7a5ddef804390b53b48bbb326d1d688a33250954b908e2128a52c45389a57945a1ce1
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84
-
Filesize
221KB
MD5bd211f127317b3c37f9c485a6afd1501
SHA1283637d08e054feb7e564cf8a893e31feaea89f2
SHA256fcebde83146eee7195db260a3d0e8fb289f04211d9cdef5ba3b0fb9ea5f1753f
SHA512f8148c1dcdade8d741e07582a152e7eaa08bdddbdf195e8f348a700821b3e5f7ffddeacd3334a4224ac7f51db4991bb5b4249cb64fb96c9e874e8aeae5d43fbf