Overview
overview
10Static
static
318b5f5ec44...05.exe
windows10-2004-x64
10246983943f...51.exe
windows10-2004-x64
10733ef926ae...74.exe
windows10-2004-x64
1081efe73b97...49.exe
windows10-2004-x64
1085d15c9234...a9.exe
windows10-2004-x64
10869bcbfd03...c1.exe
windows10-2004-x64
1088bcbe8e48...0e.exe
windows10-2004-x64
108e3b7e61aa...83.exe
windows10-2004-x64
1095ebfb1a5d...7b.exe
windows10-2004-x64
10a14a0df7d6...b5.exe
windows10-2004-x64
10a7de715d1e...f4.exe
windows10-2004-x64
10a95d0a23b0...b5.exe
windows10-2004-x64
10acced6c53e...9e.exe
windows10-2004-x64
10ad4ff817f4...f4.exe
windows10-2004-x64
7b5f2197dc6...dc.exe
windows10-2004-x64
10c354814644...fc.exe
windows10-2004-x64
10d12b0975bf...82.exe
windows10-2004-x64
10d49cc2c525...f0.exe
windows10-2004-x64
10e48626da66...e6.exe
windows10-2004-x64
10e622b46224...bc.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
733ef926aecde5ac2059782a5f2fb64f8fbbf625f2beb3ca397e8b56c0b4a574.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
81efe73b978b0562c9e65634dc76439053942720aa56e6ff1e4cfc01f3ec0c49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
85d15c923467e5894a2f36bf8563a0591dc6653d4ebd713eac8de5f3a57655a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
88bcbe8e48f13c79125efeaff65fe5dcb719586f4683dca74f0287cdab35e40e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8e3b7e61aa74a089a79cac60eb4ab68e048ad684cd4c79b7d000b22321106983.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
95ebfb1a5d55b902b4834a06e334e1b7810e32d19a0d5e6890b33312d33dac7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
a7de715d1ee0762a29e3132e9fda5b98002750ef8ee53571208fe8b92f6225f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a95d0a23b0c5bde5da2656477d19360bb7e1014fc2da653fed9ec6dd0b31cfb5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ad4ff817f44ff7266fb94f8757fc6afe62664e7c937dabddb1878c1ca9407cf4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b5f2197dc65f7c8ffbd0e39caf14248edd08aa46f69db02db370ce1daa32ebdc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c35481464455ec62b97d08f9bcb8ac75eadf87ffc4cfef30c3c3fd9edaa597fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d49cc2c52587d7ccfff0f04de2d9313a7352fee098cd64deb7bb55ca2cecd7f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e622b4622421bb1baa18a66801c5d86fb7ae8872788326cfc9670abde556f2bc.exe
Resource
win10v2004-20240426-en
General
-
Target
acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe
-
Size
1.4MB
-
MD5
5adfe625ce0b9acb6f2fcfb7ddb93ed1
-
SHA1
bae77070ad159af4a47d9f002c9242ab5a046203
-
SHA256
acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e
-
SHA512
4bf3c5b513e8c92eb3d749922ad755f732e3e1808177519575dd308b5869ae190496b028c020331a2d09dd09de774843f4bed27351fa195c412e6afa1f1d50df
-
SSDEEP
24576:HygAMt/9IiF58aP+3j9v9sjVcPJ+6Zg6lTLxw6xarOO/p/VKVncZJW56R1L:SdX88q+3jRGVE86Zg6hy6xarlxEnc5
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral13/memory/2168-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral13/memory/2168-32-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral13/memory/2168-30-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral13/memory/1088-40-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral13/memory/1116-21-0x0000000002470000-0x0000000002490000-memory.dmp net_reactor behavioral13/memory/1116-23-0x0000000004990000-0x00000000049AE000-memory.dmp net_reactor -
Executes dropped EXE 6 IoCs
pid Process 2768 LC1Fv16.exe 2516 tJ9jX65.exe 1116 1Es77QW0.exe 1064 2IO6427.exe 2748 3mW13OM.exe 912 4er892rY.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" LC1Fv16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tJ9jX65.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1064 set thread context of 2168 1064 2IO6427.exe 99 PID 2748 set thread context of 880 2748 3mW13OM.exe 102 PID 912 set thread context of 1088 912 4er892rY.exe 105 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1116 1Es77QW0.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3248 wrote to memory of 2768 3248 acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe 83 PID 3248 wrote to memory of 2768 3248 acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe 83 PID 3248 wrote to memory of 2768 3248 acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe 83 PID 2768 wrote to memory of 2516 2768 LC1Fv16.exe 84 PID 2768 wrote to memory of 2516 2768 LC1Fv16.exe 84 PID 2768 wrote to memory of 2516 2768 LC1Fv16.exe 84 PID 2516 wrote to memory of 1116 2516 tJ9jX65.exe 85 PID 2516 wrote to memory of 1116 2516 tJ9jX65.exe 85 PID 2516 wrote to memory of 1116 2516 tJ9jX65.exe 85 PID 2516 wrote to memory of 1064 2516 tJ9jX65.exe 95 PID 2516 wrote to memory of 1064 2516 tJ9jX65.exe 95 PID 2516 wrote to memory of 1064 2516 tJ9jX65.exe 95 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 1064 wrote to memory of 2168 1064 2IO6427.exe 99 PID 2768 wrote to memory of 2748 2768 LC1Fv16.exe 100 PID 2768 wrote to memory of 2748 2768 LC1Fv16.exe 100 PID 2768 wrote to memory of 2748 2768 LC1Fv16.exe 100 PID 2748 wrote to memory of 880 2748 3mW13OM.exe 102 PID 2748 wrote to memory of 880 2748 3mW13OM.exe 102 PID 2748 wrote to memory of 880 2748 3mW13OM.exe 102 PID 2748 wrote to memory of 880 2748 3mW13OM.exe 102 PID 2748 wrote to memory of 880 2748 3mW13OM.exe 102 PID 2748 wrote to memory of 880 2748 3mW13OM.exe 102 PID 3248 wrote to memory of 912 3248 acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe 103 PID 3248 wrote to memory of 912 3248 acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe 103 PID 3248 wrote to memory of 912 3248 acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe 103 PID 912 wrote to memory of 1088 912 4er892rY.exe 105 PID 912 wrote to memory of 1088 912 4er892rY.exe 105 PID 912 wrote to memory of 1088 912 4er892rY.exe 105 PID 912 wrote to memory of 1088 912 4er892rY.exe 105 PID 912 wrote to memory of 1088 912 4er892rY.exe 105 PID 912 wrote to memory of 1088 912 4er892rY.exe 105 PID 912 wrote to memory of 1088 912 4er892rY.exe 105 PID 912 wrote to memory of 1088 912 4er892rY.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe"C:\Users\Admin\AppData\Local\Temp\acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LC1Fv16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LC1Fv16.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJ9jX65.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJ9jX65.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Es77QW0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Es77QW0.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2IO6427.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2IO6427.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3mW13OM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3mW13OM.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4er892rY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4er892rY.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5267ef1a960bfb0bb33928ec219dc1cea
SHA1fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf
SHA256b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e
SHA512ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f
-
Filesize
1005KB
MD525e67b7fef8a7516eb46e1ae99e4adcc
SHA12cff044528c475f8fca107c25db6989b82664f58
SHA256d388552e755d178d396916c5cced3efbb39f0900e79121da01e68397b59fc865
SHA512945fad17d8ffc5011629d35c26f4f6c7b4f8160afb9a44651cfca04ac3f2d6c96c6a451211c574673b61aebd3b877e159cb55762e21b068941d33e29c11988ed
-
Filesize
973KB
MD55dc4be46727c1853e63ebdd240ec9bd9
SHA16265b41bbecbb96cf666d2b4cbd6f209f44d7a2d
SHA2561df63e2de3adac7ff425c75b3f649078fd7a8e0008e5063bd290adb1cdba2446
SHA51259828cba7af9fb26c6717eb3e655eec07f732ec92d3ec0cce7ed2df1acf6095dec2d97cdbbd3591ed96c08cb2adcff12c31534a93b48757ff8976c0a4233062b
-
Filesize
621KB
MD5e8cf8c4fe5c92ebe4a847898c5390558
SHA17392e693b3fd0aa86176fa509d8c04a4ec27421a
SHA256a4635bd2f929dbf5077f4a83049f3d8d88c9c7c1f239073d43db9ec339b32178
SHA5124780baaf2ee308a0fd6b5146478f31a5cd9692b7a6988f1f8f63b51d5c1fd60400d1eceae3c91df0b196225f9b6931c0a0de1f65abc2094c5a112ff31776e75d
-
Filesize
195KB
MD57f726f7dac36a27880ea545866534dda
SHA1a644a86f8ffe8497101eb2c8ef69b859fb51119d
SHA2567d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a
SHA5128d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775
-
Filesize
1.1MB
MD56ef68ec5b2d91cbc9c66fa0553e527ec
SHA18d8ab02a5f2433cf12ba62336e4d774f2bbf21d2
SHA2568ffa8c6bcf0b38b229ac57e8a8eacfad2d27bd2b6ec971af827609bfb919495f
SHA5121a02ccdf3d1be279169bc25eb2a4452be337389b78050811ea4367ca624d5d169c7c7e157a73fe3be13378412e8d94606f41c157b5892cc76c4344ee85d204a6