Overview
overview
10Static
static
318b5f5ec44...05.exe
windows10-2004-x64
10246983943f...51.exe
windows10-2004-x64
10733ef926ae...74.exe
windows10-2004-x64
1081efe73b97...49.exe
windows10-2004-x64
1085d15c9234...a9.exe
windows10-2004-x64
10869bcbfd03...c1.exe
windows10-2004-x64
1088bcbe8e48...0e.exe
windows10-2004-x64
108e3b7e61aa...83.exe
windows10-2004-x64
1095ebfb1a5d...7b.exe
windows10-2004-x64
10a14a0df7d6...b5.exe
windows10-2004-x64
10a7de715d1e...f4.exe
windows10-2004-x64
10a95d0a23b0...b5.exe
windows10-2004-x64
10acced6c53e...9e.exe
windows10-2004-x64
10ad4ff817f4...f4.exe
windows10-2004-x64
7b5f2197dc6...dc.exe
windows10-2004-x64
10c354814644...fc.exe
windows10-2004-x64
10d12b0975bf...82.exe
windows10-2004-x64
10d49cc2c525...f0.exe
windows10-2004-x64
10e48626da66...e6.exe
windows10-2004-x64
10e622b46224...bc.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
733ef926aecde5ac2059782a5f2fb64f8fbbf625f2beb3ca397e8b56c0b4a574.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
81efe73b978b0562c9e65634dc76439053942720aa56e6ff1e4cfc01f3ec0c49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
85d15c923467e5894a2f36bf8563a0591dc6653d4ebd713eac8de5f3a57655a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
88bcbe8e48f13c79125efeaff65fe5dcb719586f4683dca74f0287cdab35e40e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8e3b7e61aa74a089a79cac60eb4ab68e048ad684cd4c79b7d000b22321106983.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
95ebfb1a5d55b902b4834a06e334e1b7810e32d19a0d5e6890b33312d33dac7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
a7de715d1ee0762a29e3132e9fda5b98002750ef8ee53571208fe8b92f6225f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a95d0a23b0c5bde5da2656477d19360bb7e1014fc2da653fed9ec6dd0b31cfb5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ad4ff817f44ff7266fb94f8757fc6afe62664e7c937dabddb1878c1ca9407cf4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b5f2197dc65f7c8ffbd0e39caf14248edd08aa46f69db02db370ce1daa32ebdc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c35481464455ec62b97d08f9bcb8ac75eadf87ffc4cfef30c3c3fd9edaa597fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d49cc2c52587d7ccfff0f04de2d9313a7352fee098cd64deb7bb55ca2cecd7f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e622b4622421bb1baa18a66801c5d86fb7ae8872788326cfc9670abde556f2bc.exe
Resource
win10v2004-20240426-en
General
-
Target
e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe
-
Size
511KB
-
MD5
ae9b91adcf67c2bd0ac2a681f05c0adc
-
SHA1
0da2417ee4c5358398e349e185ab4da6424abef3
-
SHA256
e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6
-
SHA512
25b43617236d4e9b65bb0ab17b3aeb80ec68420dcf44a43f43844ee41eb38e7b1ab7fa5baff83d68b125bb79168b12a09efda0719f0d6809c83bf5abb8c74712
-
SSDEEP
12288:IMrNy90+79pyDHwaEmfFr+dJY8TUs2Vum+4+wSR1Fdsjh2h:1y3pBlUFGYSz2VuRUSnYjh2h
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral19/memory/1476-14-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral19/memory/1476-15-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral19/memory/1476-16-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral19/memory/1476-18-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral19/memory/1096-22-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 7cy9tj29.exe -
Executes dropped EXE 4 IoCs
pid Process 2172 TA1Ka24.exe 2364 1Qz85yU0.exe 1220 2tE4449.exe 5104 7cy9tj29.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" TA1Ka24.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2364 set thread context of 1476 2364 1Qz85yU0.exe 85 PID 1220 set thread context of 1096 1220 2tE4449.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1972 1476 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2172 2992 e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe 82 PID 2992 wrote to memory of 2172 2992 e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe 82 PID 2992 wrote to memory of 2172 2992 e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe 82 PID 2172 wrote to memory of 2364 2172 TA1Ka24.exe 83 PID 2172 wrote to memory of 2364 2172 TA1Ka24.exe 83 PID 2172 wrote to memory of 2364 2172 TA1Ka24.exe 83 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2364 wrote to memory of 1476 2364 1Qz85yU0.exe 85 PID 2172 wrote to memory of 1220 2172 TA1Ka24.exe 87 PID 2172 wrote to memory of 1220 2172 TA1Ka24.exe 87 PID 2172 wrote to memory of 1220 2172 TA1Ka24.exe 87 PID 1220 wrote to memory of 1096 1220 2tE4449.exe 92 PID 1220 wrote to memory of 1096 1220 2tE4449.exe 92 PID 1220 wrote to memory of 1096 1220 2tE4449.exe 92 PID 1220 wrote to memory of 1096 1220 2tE4449.exe 92 PID 1220 wrote to memory of 1096 1220 2tE4449.exe 92 PID 1220 wrote to memory of 1096 1220 2tE4449.exe 92 PID 1220 wrote to memory of 1096 1220 2tE4449.exe 92 PID 1220 wrote to memory of 1096 1220 2tE4449.exe 92 PID 2992 wrote to memory of 5104 2992 e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe 93 PID 2992 wrote to memory of 5104 2992 e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe 93 PID 2992 wrote to memory of 5104 2992 e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe 93 PID 5104 wrote to memory of 2080 5104 7cy9tj29.exe 94 PID 5104 wrote to memory of 2080 5104 7cy9tj29.exe 94 PID 5104 wrote to memory of 2080 5104 7cy9tj29.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe"C:\Users\Admin\AppData\Local\Temp\e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TA1Ka24.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TA1Ka24.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Qz85yU0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Qz85yU0.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 5405⤵
- Program crash
PID:1972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2tE4449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2tE4449.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7cy9tj29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7cy9tj29.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\is64.bat" "3⤵PID:2080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1476 -ip 14761⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD52149dd58e781f72f9425e375ef29842c
SHA171f092b5c8ab3d3204d152f2f84920b96221e17d
SHA256dea74a6ffc7924eaa125e335e36cb0710e7458867fcf3d519c2771e852deecc4
SHA51261cd3b29942cd9fb5ff897fa8401a7523a6c547759f45214b362c540f862e5344a3648255a93001a9dadabbd8db012e7a2cf5e738524f38e6f5fb9294008436b
-
Filesize
389KB
MD5989b3c1150d18f2c0dc7e96988e68045
SHA129259d7f02d47821807c87cc74348ebf384258d3
SHA25620c4cf8ca2f6d61e14f72361d53534729ed20b38479636cf201293a4565d8b7c
SHA5128c0ce2b40101a1b5099d1501a4e55c5f94cde74d3d766030c34f1dcbb804406ba25de93f26d2755bacc10e76a8c44589122bdb36b6096684f9f06b85e47f22bb
-
Filesize
300KB
MD5784667bb96ccb30c4cf44f2c5f493769
SHA128185165ab4dbbb4a139ae1af0bb6934ebe05c04
SHA2561025fb084bca865df30e69eea7a9a4a3c852626e148b340de661e6f5b63bc1c9
SHA51262c9def097f132cdb26b11e586f3e15407b9eb9e9e32f79460a3be1bd4c8e046db8488f754cd1c1cc4fe4025a3f9bc9484e94eae0c7d273050f8e6548d12bc20
-
Filesize
339KB
MD514d9834611ad581afcfea061652ff6cb
SHA1802f964d0be7858eb2f1e7c6fcda03501fd1b71c
SHA256e6e9b3d830f2d7860a09d596576e8ab0131c527b47dda73fe727b71b44c8cf60
SHA512cbef1f44eb76d719c60d857a567a3fc700d62751111337cd4f8d30deae6901dc361320f28dac5ec5468420419eed66cada20f4c90fe07db6a3f8cf959eba31b5
-
Filesize
181B
MD5225edee1d46e0a80610db26b275d72fb
SHA1ce206abf11aaf19278b72f5021cc64b1b427b7e8
SHA256e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559
SHA5124f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504