Overview
overview
10Static
static
318b5f5ec44...05.exe
windows10-2004-x64
10246983943f...51.exe
windows10-2004-x64
10733ef926ae...74.exe
windows10-2004-x64
1081efe73b97...49.exe
windows10-2004-x64
1085d15c9234...a9.exe
windows10-2004-x64
10869bcbfd03...c1.exe
windows10-2004-x64
1088bcbe8e48...0e.exe
windows10-2004-x64
108e3b7e61aa...83.exe
windows10-2004-x64
1095ebfb1a5d...7b.exe
windows10-2004-x64
10a14a0df7d6...b5.exe
windows10-2004-x64
10a7de715d1e...f4.exe
windows10-2004-x64
10a95d0a23b0...b5.exe
windows10-2004-x64
10acced6c53e...9e.exe
windows10-2004-x64
10ad4ff817f4...f4.exe
windows10-2004-x64
7b5f2197dc6...dc.exe
windows10-2004-x64
10c354814644...fc.exe
windows10-2004-x64
10d12b0975bf...82.exe
windows10-2004-x64
10d49cc2c525...f0.exe
windows10-2004-x64
10e48626da66...e6.exe
windows10-2004-x64
10e622b46224...bc.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
733ef926aecde5ac2059782a5f2fb64f8fbbf625f2beb3ca397e8b56c0b4a574.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
81efe73b978b0562c9e65634dc76439053942720aa56e6ff1e4cfc01f3ec0c49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
85d15c923467e5894a2f36bf8563a0591dc6653d4ebd713eac8de5f3a57655a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
88bcbe8e48f13c79125efeaff65fe5dcb719586f4683dca74f0287cdab35e40e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8e3b7e61aa74a089a79cac60eb4ab68e048ad684cd4c79b7d000b22321106983.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
95ebfb1a5d55b902b4834a06e334e1b7810e32d19a0d5e6890b33312d33dac7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
a7de715d1ee0762a29e3132e9fda5b98002750ef8ee53571208fe8b92f6225f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a95d0a23b0c5bde5da2656477d19360bb7e1014fc2da653fed9ec6dd0b31cfb5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ad4ff817f44ff7266fb94f8757fc6afe62664e7c937dabddb1878c1ca9407cf4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b5f2197dc65f7c8ffbd0e39caf14248edd08aa46f69db02db370ce1daa32ebdc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c35481464455ec62b97d08f9bcb8ac75eadf87ffc4cfef30c3c3fd9edaa597fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d49cc2c52587d7ccfff0f04de2d9313a7352fee098cd64deb7bb55ca2cecd7f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e622b4622421bb1baa18a66801c5d86fb7ae8872788326cfc9670abde556f2bc.exe
Resource
win10v2004-20240426-en
General
-
Target
a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe
-
Size
1.1MB
-
MD5
257b7a3fbfab4302100f94e1b7cf3582
-
SHA1
e3fcf617c24c32d802c5a25f102ce12e7c9d57a8
-
SHA256
a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5
-
SHA512
0e603c7584bfcf8ef6c9b91b6dea7bb1d905e4ff4f8f43cadea9c17f6a4132e5acb41b8953d87e440409c1d92367512596c71b4a93658e1c36ee16b137cb9659
-
SSDEEP
24576:tyw0R9Gr2IlzEM7WeQPUu0Adk3jZQ63S5HTGsITFVsu0Urt7rxpl:Iw89GaItZQcAy3jW6C5HTGsYVBrt/xp
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral10/memory/2084-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral10/memory/2084-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral10/memory/2084-37-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x00070000000233f8-40.dat family_redline behavioral10/memory/1020-42-0x0000000000960000-0x000000000099E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3320 pr7kv0ri.exe 5048 zA7Ft2oS.exe 768 pU5TJ8Ki.exe 1612 Aj9xk6GW.exe 5004 1fe14Tp5.exe 1020 2aQ772fp.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pr7kv0ri.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zA7Ft2oS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pU5TJ8Ki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Aj9xk6GW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5004 set thread context of 2084 5004 1fe14Tp5.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 4680 5004 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4140 wrote to memory of 3320 4140 a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe 82 PID 4140 wrote to memory of 3320 4140 a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe 82 PID 4140 wrote to memory of 3320 4140 a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe 82 PID 3320 wrote to memory of 5048 3320 pr7kv0ri.exe 83 PID 3320 wrote to memory of 5048 3320 pr7kv0ri.exe 83 PID 3320 wrote to memory of 5048 3320 pr7kv0ri.exe 83 PID 5048 wrote to memory of 768 5048 zA7Ft2oS.exe 84 PID 5048 wrote to memory of 768 5048 zA7Ft2oS.exe 84 PID 5048 wrote to memory of 768 5048 zA7Ft2oS.exe 84 PID 768 wrote to memory of 1612 768 pU5TJ8Ki.exe 86 PID 768 wrote to memory of 1612 768 pU5TJ8Ki.exe 86 PID 768 wrote to memory of 1612 768 pU5TJ8Ki.exe 86 PID 1612 wrote to memory of 5004 1612 Aj9xk6GW.exe 87 PID 1612 wrote to memory of 5004 1612 Aj9xk6GW.exe 87 PID 1612 wrote to memory of 5004 1612 Aj9xk6GW.exe 87 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 5004 wrote to memory of 2084 5004 1fe14Tp5.exe 90 PID 1612 wrote to memory of 1020 1612 Aj9xk6GW.exe 95 PID 1612 wrote to memory of 1020 1612 Aj9xk6GW.exe 95 PID 1612 wrote to memory of 1020 1612 Aj9xk6GW.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe"C:\Users\Admin\AppData\Local\Temp\a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr7kv0ri.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr7kv0ri.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zA7Ft2oS.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zA7Ft2oS.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pU5TJ8Ki.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pU5TJ8Ki.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Aj9xk6GW.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Aj9xk6GW.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fe14Tp5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1fe14Tp5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 1607⤵
- Program crash
PID:4680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aQ772fp.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aQ772fp.exe6⤵
- Executes dropped EXE
PID:1020
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5004 -ip 50041⤵PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1004KB
MD5fd68846290ad57230c819e6b98e8ee1a
SHA1f8303bfa0a0fd338923c645e3e77b0d8d0ee43b4
SHA256593a162eec890738e32ef1ddbd43adaaef5da00ba8daf4f7214bf4c52ce42772
SHA5120a0653e10d71958702c172328c121f38ad2e3ef2114f330039336247b272e4eabfb5deca7536814655a2e8ad11233cd978f9e9d965442764bf7baf6f0a4f9e0c
-
Filesize
815KB
MD5b0f4b8791cb8a771119cc924d81a080c
SHA18db6d49d085b12e158c3ae65d16d7dd2978cf66e
SHA25650c1034b63a5a8d7d052d1bfaefd6e3cbcb6c119ad88a038c20a863ad38aca22
SHA512748a9b326225fbb2f9621238f23da5dfdfd4cf45af1a36c85e9a11745dd74471e6ae7e71d92c2014aa128c0b137a8db68dc762f3217f5299303adf038d742429
-
Filesize
582KB
MD524f9e25f5918b26e437e4b4120dfa2eb
SHA12436460a980290fc57124654e125072437991c52
SHA25666f85b9a2ca15323e5e0b9ddd49f1120b0220db0fe811218332070529b67867d
SHA5121102ae75fab3b07b09be80e01d1694e51e6d83c67e63da684eceb5209e33767c40fc225fa83e500ae4297e1356a27dce96a8360a516a1ef15bdeb48831e0f655
-
Filesize
382KB
MD5d6b8fcdb08e7992a0f4bf4b8d7940f47
SHA1f4ff15bd570535a695bd72e118c22ccefb96cbe8
SHA256e79e94ac640e6decb968fb1faf61de593741b813bdc886607d88420b461a1b8a
SHA5123194e532862632089823a2d8db6c3960b232bc7f599c2b117e81ac9f8cf5fd02bb8143bff3d0f43c9a74ba392222615d3d7e146ea8484df90276b0881afaf704
-
Filesize
295KB
MD542700092210bb208b2db58f68e9ea01b
SHA17446f078dc4157faf55d41f40e1111a37e30c3fa
SHA256d8a393e19273486cc2f54bab3051c97dd77b616136eccbccb8f804fc5f1d3194
SHA512f0ed50c0db48be84d0c01c13c18a951185198fb68d33d43d1e8a3ad2a552fbfee404e1f8fa24f11efd6aa57391b12c05b837e9a4f2637f31b2c01a1879bc4384
-
Filesize
222KB
MD582b2aef22e591b7a52d3bb32fde0b544
SHA11d2934b654d8bd1e8ad58f103a096892cf7d720d
SHA256843b163433ff0a884d0077155f1df36e8f04c529917845f2f2bb3fdbb840dcd5
SHA512fad1355b1f8ee4fdeae41f4a415085e80121700a74fe46376c37944cf5ce8723ae9044630c55b0939c98c234b3d7ebb086aaeda57157aef686eaa353656c445d