Overview
overview
10Static
static
318b5f5ec44...05.exe
windows10-2004-x64
10246983943f...51.exe
windows10-2004-x64
10733ef926ae...74.exe
windows10-2004-x64
1081efe73b97...49.exe
windows10-2004-x64
1085d15c9234...a9.exe
windows10-2004-x64
10869bcbfd03...c1.exe
windows10-2004-x64
1088bcbe8e48...0e.exe
windows10-2004-x64
108e3b7e61aa...83.exe
windows10-2004-x64
1095ebfb1a5d...7b.exe
windows10-2004-x64
10a14a0df7d6...b5.exe
windows10-2004-x64
10a7de715d1e...f4.exe
windows10-2004-x64
10a95d0a23b0...b5.exe
windows10-2004-x64
10acced6c53e...9e.exe
windows10-2004-x64
10ad4ff817f4...f4.exe
windows10-2004-x64
7b5f2197dc6...dc.exe
windows10-2004-x64
10c354814644...fc.exe
windows10-2004-x64
10d12b0975bf...82.exe
windows10-2004-x64
10d49cc2c525...f0.exe
windows10-2004-x64
10e48626da66...e6.exe
windows10-2004-x64
10e622b46224...bc.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
733ef926aecde5ac2059782a5f2fb64f8fbbf625f2beb3ca397e8b56c0b4a574.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
81efe73b978b0562c9e65634dc76439053942720aa56e6ff1e4cfc01f3ec0c49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
85d15c923467e5894a2f36bf8563a0591dc6653d4ebd713eac8de5f3a57655a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
88bcbe8e48f13c79125efeaff65fe5dcb719586f4683dca74f0287cdab35e40e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8e3b7e61aa74a089a79cac60eb4ab68e048ad684cd4c79b7d000b22321106983.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
95ebfb1a5d55b902b4834a06e334e1b7810e32d19a0d5e6890b33312d33dac7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
a7de715d1ee0762a29e3132e9fda5b98002750ef8ee53571208fe8b92f6225f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a95d0a23b0c5bde5da2656477d19360bb7e1014fc2da653fed9ec6dd0b31cfb5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ad4ff817f44ff7266fb94f8757fc6afe62664e7c937dabddb1878c1ca9407cf4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b5f2197dc65f7c8ffbd0e39caf14248edd08aa46f69db02db370ce1daa32ebdc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c35481464455ec62b97d08f9bcb8ac75eadf87ffc4cfef30c3c3fd9edaa597fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d49cc2c52587d7ccfff0f04de2d9313a7352fee098cd64deb7bb55ca2cecd7f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e622b4622421bb1baa18a66801c5d86fb7ae8872788326cfc9670abde556f2bc.exe
Resource
win10v2004-20240426-en
General
-
Target
d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe
-
Size
1.4MB
-
MD5
d124366ab9ab93de3da5489c9ea6b92d
-
SHA1
cd39f187e6df38d35d54e3015e8d4a75bcee4ecb
-
SHA256
d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82
-
SHA512
dbfe9497d6b5bd6fef782e3d42e4b4927fb0007c3def129bc96efbe9e065dbce5043dcd72f11c178ee2bc92c93792ed9d705e8984f511a9a475c9c78dad278d9
-
SSDEEP
24576:FyYD7grTJKqXHTw/ruN4HY5+siC6DjwwuDs0jba+rR:g27grXXoruN4HY5qC6fY
Malware Config
Extracted
redline
kedru
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral17/memory/1888-24-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral17/memory/1888-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral17/memory/1888-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral17/files/0x0007000000023443-26.dat family_redline behavioral17/memory/1544-28-0x0000000000360000-0x000000000039C000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1184 by9uy1Kp.exe 2568 du4KX6Mc.exe 2116 1Ol30Wo6.exe 1544 2iL175Ul.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" by9uy1Kp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" du4KX6Mc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 1888 2116 1Ol30Wo6.exe 87 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1184 1516 d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe 83 PID 1516 wrote to memory of 1184 1516 d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe 83 PID 1516 wrote to memory of 1184 1516 d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe 83 PID 1184 wrote to memory of 2568 1184 by9uy1Kp.exe 84 PID 1184 wrote to memory of 2568 1184 by9uy1Kp.exe 84 PID 1184 wrote to memory of 2568 1184 by9uy1Kp.exe 84 PID 2568 wrote to memory of 2116 2568 du4KX6Mc.exe 85 PID 2568 wrote to memory of 2116 2568 du4KX6Mc.exe 85 PID 2568 wrote to memory of 2116 2568 du4KX6Mc.exe 85 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2116 wrote to memory of 1888 2116 1Ol30Wo6.exe 87 PID 2568 wrote to memory of 1544 2568 du4KX6Mc.exe 89 PID 2568 wrote to memory of 1544 2568 du4KX6Mc.exe 89 PID 2568 wrote to memory of 1544 2568 du4KX6Mc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe"C:\Users\Admin\AppData\Local\Temp\d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\by9uy1Kp.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\by9uy1Kp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\du4KX6Mc.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\du4KX6Mc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Ol30Wo6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Ol30Wo6.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2iL175Ul.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2iL175Ul.exe4⤵
- Executes dropped EXE
PID:1544
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
883KB
MD5cacff1bfd5a58b755bfb91d01081e313
SHA114d4cda5c48bbeda9f70f1972755eb4491a659e5
SHA256285d1f8fc6ac0268b89ed02efdb2ca003c1b42cf7b9044f0e42d607ea427ff01
SHA512f44b399f3ac7feae9081d7f904b1015509d4eb69d897b121b91426f30dc0347f9d3a07c83379f85e8b95d66e324ed115b8e144609a61896a0185ca20eef28747
-
Filesize
688KB
MD56e05410183bca3ea452bf9be21c2283b
SHA1daf1178aca56501466db03205df0d9f97447c595
SHA256dbf088733a32df648074ace70313270001b2a6ce9e8104d07290d3ec1f9cad1d
SHA512cd02f6615f81a9ab73ee592054ead21decc837b70ab19cda9d7613f1406e0e6f958c30aff814d63adb0f10e3067b6ba2ccc53cc8dd44f112afadc4fb79d15ad5
-
Filesize
1.8MB
MD5289a8a1fcea2aab512525952079144a2
SHA12f218631b4b73038054f4a1f79b722b9690cbd20
SHA256cd97bca94e07999d1619f6e2b76a56a2dd4baaa42a65e8963f745e060d8563ea
SHA51241b4da4f6f73eaece06522c08525ed3cfa0207326b2e3e6c472ab6f1383e7b4cf290a967965f1646d5a4891f955056814776041f6ade7b051a7a3b6e3c2c4880
-
Filesize
219KB
MD57efee2e95ca7583bfa875c6e0fa08977
SHA170f55fd47841deeffed18eb14d65c7b76cf0ae26
SHA2567788a401ca11a36b420b6e77e3aba65289f71f2ab7e8cf2b2ba39c3277cb9b70
SHA512c896b5d873ff9ce6a7f662408e67fdfa024c0ef951c380795818042289e4e0f61d840d613a3f81824a807dc879d4c9a20d427a5b4d505295a1975373aa2d2343