Overview
overview
10Static
static
315dbe47ffc...c2.exe
windows10-2004-x64
10259d304678...83.exe
windows10-2004-x64
102692caca2a...20.exe
windows10-2004-x64
1028a50ab6e2...10.exe
windows10-2004-x64
104c05a0a402...f4.exe
windows10-2004-x64
105a9aed6661...2d.exe
windows10-2004-x64
105f5fe0dfe7...ca.exe
windows10-2004-x64
106b5a910219...c6.exe
windows10-2004-x64
106d91ecfeed...9b.exe
windows7-x64
106d91ecfeed...9b.exe
windows10-2004-x64
106ffb586f67...d9.exe
windows10-2004-x64
1073c6d3d5d7...90.exe
windows10-2004-x64
1075b625c13b...07.exe
windows10-2004-x64
108a4cf22002...f5.exe
windows7-x64
108a4cf22002...f5.exe
windows10-2004-x64
10aa03da34a3...c3.exe
windows10-2004-x64
10c4259cbbbe...3b.exe
windows10-2004-x64
10c71d93f739...fb.exe
windows10-2004-x64
10c98c961b6f...67.exe
windows10-2004-x64
10d76ee17b4a...b8.exe
windows10-2004-x64
7ec3af3633a...54.exe
windows10-2004-x64
10fbb293bc8b...e5.exe
windows10-2004-x64
10Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
15dbe47ffc282036b5b74c9775a05b1985197b01705a5e5240936b02f6f8c2c2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
259d304678a712b51f1187d33ecd946f12224f4900cad091b3a39900d04e9d83.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2692caca2a880cb62bad959791f7e78945d5e600364901df7fc8de45a268a520.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
28a50ab6e2f0c1302196528ba89864cb218567116ae9f4a7ff25ad2517acf510.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4c05a0a402e12dd4248772fa3577f38e1fc9b8b060c219cf8a4890bfce5439f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5a9aed66614843df861e1716ffa1565f310d3f61f384e45ac0468be8b6bc162d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
5f5fe0dfe7abbcda9826593f0816a3b72630e87a3d058a3382b48820dfc0f3ca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6b5a910219dbef3059255fe4700c0b661a248a20051c4624275c60fcb969a4c6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6d91ecfeedfc048e057ef390c0a9a12a14dd8dadc74b44e7d17e7d767fa6fb9b.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
6d91ecfeedfc048e057ef390c0a9a12a14dd8dadc74b44e7d17e7d767fa6fb9b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
6ffb586f674fda7588cfb5e9ebac49e43e607069c4c43597e624fc42ac70b8d9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
73c6d3d5d789b4c1b22119cf829a0a27609d598ad9afb0d622c8abb66982bf90.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
75b625c13b24d7458adfc514723864292401468613eaedafdba252e90b3f5707.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
8a4cf2200249c16ad339a708d70a7a76427cc48fe52e324e22cb2b14c043a4f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
8a4cf2200249c16ad339a708d70a7a76427cc48fe52e324e22cb2b14c043a4f5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c4259cbbbeecc45ba6b72e216489e0c0f668de9a18069a255c88f5440350243b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
c71d93f73909af1aaed89e205cf18f3305701f5725a7f73bc47959ec2fe389fb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d76ee17b4a6047aa98a5b0abc7a035b345706ef3087c8b527b238db6e24fdbb8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
fbb293bc8b089d284989e99bec9363092a97e4084b29e5eeb9d9ac35568bb7e5.exe
Resource
win10v2004-20240426-en
General
-
Target
aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe
-
Size
1.0MB
-
MD5
9f6c04bd0bbcf415ffa42768e2183a73
-
SHA1
a44f938d1c7ad1fc21882a00da4d2f35af3174b6
-
SHA256
aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3
-
SHA512
a7075b29cb0a85620f641ed5d72acf198554a0083925a66e0ee2313edf169321c8167058c94004077c31f94cbc2b7a1a5c9d094cb27e26925dcafd6e08788f5f
-
SSDEEP
24576:Kyv+2Lx/11SMH1d7yboNDkwZmaujBRgSbRBl9Srlb2NP:Rv+K/CavNY4+zgq3srlC
Malware Config
Extracted
redline
plost
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral16/memory/1212-25-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/1212-26-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/1212-28-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral16/memory/1688-37-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 1308 KL8Ci89.exe 3440 Ws0Cs25.exe 3424 1hG30or6.exe 1488 2il4240.exe 212 3cn07WY.exe 508 4tK390UO.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" KL8Ci89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ws0Cs25.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3424 set thread context of 3572 3424 1hG30or6.exe 85 PID 1488 set thread context of 1212 1488 2il4240.exe 88 PID 508 set thread context of 1688 508 4tK390UO.exe 91 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4208 sc.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cn07WY.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cn07WY.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3cn07WY.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3572 AppLaunch.exe 3572 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3572 AppLaunch.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4700 wrote to memory of 1308 4700 aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe 82 PID 4700 wrote to memory of 1308 4700 aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe 82 PID 4700 wrote to memory of 1308 4700 aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe 82 PID 1308 wrote to memory of 3440 1308 KL8Ci89.exe 83 PID 1308 wrote to memory of 3440 1308 KL8Ci89.exe 83 PID 1308 wrote to memory of 3440 1308 KL8Ci89.exe 83 PID 3440 wrote to memory of 3424 3440 Ws0Cs25.exe 84 PID 3440 wrote to memory of 3424 3440 Ws0Cs25.exe 84 PID 3440 wrote to memory of 3424 3440 Ws0Cs25.exe 84 PID 3424 wrote to memory of 3572 3424 1hG30or6.exe 85 PID 3424 wrote to memory of 3572 3424 1hG30or6.exe 85 PID 3424 wrote to memory of 3572 3424 1hG30or6.exe 85 PID 3424 wrote to memory of 3572 3424 1hG30or6.exe 85 PID 3424 wrote to memory of 3572 3424 1hG30or6.exe 85 PID 3424 wrote to memory of 3572 3424 1hG30or6.exe 85 PID 3424 wrote to memory of 3572 3424 1hG30or6.exe 85 PID 3424 wrote to memory of 3572 3424 1hG30or6.exe 85 PID 3440 wrote to memory of 1488 3440 Ws0Cs25.exe 86 PID 3440 wrote to memory of 1488 3440 Ws0Cs25.exe 86 PID 3440 wrote to memory of 1488 3440 Ws0Cs25.exe 86 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1488 wrote to memory of 1212 1488 2il4240.exe 88 PID 1308 wrote to memory of 212 1308 KL8Ci89.exe 89 PID 1308 wrote to memory of 212 1308 KL8Ci89.exe 89 PID 1308 wrote to memory of 212 1308 KL8Ci89.exe 89 PID 4700 wrote to memory of 508 4700 aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe 90 PID 4700 wrote to memory of 508 4700 aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe 90 PID 4700 wrote to memory of 508 4700 aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe 90 PID 508 wrote to memory of 1688 508 4tK390UO.exe 91 PID 508 wrote to memory of 1688 508 4tK390UO.exe 91 PID 508 wrote to memory of 1688 508 4tK390UO.exe 91 PID 508 wrote to memory of 1688 508 4tK390UO.exe 91 PID 508 wrote to memory of 1688 508 4tK390UO.exe 91 PID 508 wrote to memory of 1688 508 4tK390UO.exe 91 PID 508 wrote to memory of 1688 508 4tK390UO.exe 91 PID 508 wrote to memory of 1688 508 4tK390UO.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe"C:\Users\Admin\AppData\Local\Temp\aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KL8Ci89.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\KL8Ci89.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ws0Cs25.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ws0Cs25.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1hG30or6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1hG30or6.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2il4240.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2il4240.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3cn07WY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3cn07WY.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4tK390UO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4tK390UO.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1688
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4208
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5fe77925312ef6d6fe198bb23f4f7ccbc
SHA1e51ba7779fc491488df0067fab8ff0f2a287e18c
SHA25649a51ab7d5847d49a0b84541c3396507534ce8781a0475ab6eef20f77f2c198f
SHA512991143abdb509d4d13c3be124a8b8b1a0e2c5032136b938bf20147300048a6416ed32b10452c32bf30c9e2cca678be0949b2fa2db9d000b19421dc30cc50762b
-
Filesize
641KB
MD53e8e767f7d2e79c2090fd233c9fc91bf
SHA172817414899227d7059da767216eaa018f4d8f1f
SHA25643445eec066c9d8f91679666ae423b092e12d5d1c9b74a1dd04f602ccde87ab0
SHA512daeb32f4088afb6e460d358a981e3b10a833a432da495019ddc0acf0b6bc78f5af1a5c30e5fa1352de356baa2b71cd971b8c2e32252669337e96d26ff0bd7070
-
Filesize
31KB
MD5a5d2b5187bff43ec33ee9c3fd4217e90
SHA18e65d0c12a24dc675f831ce291caef80949587f4
SHA2569fe056b48a20dcbcefa601585e6ce3e315979f98f5eb7c22e8c30253305de341
SHA51269deae10ea5405d247e96fee75efcb9a8e0cfd9581829b0a9412526d3e82b4fbd4b9060e9aabfd5f3ec7fab0ec3fb67e561269b3a1e833964a4ccacd42a6b58e
-
Filesize
517KB
MD59634eebfd5f832f1c1db723e3fc45674
SHA11d9768b277009b65daeab5e0ada6665f03ad09e6
SHA256bab3700e41ce808617827ad9335bf4553ffd411d0d50d753cccb6913a4bb1ffc
SHA512ce0e07c6cd8fda04ee133d0009c1ab2e1c4884cd36ce99d5dcc64fc12bd7236be7dd15e03563a51029d8e7d1df745fcee885fa505e60217a83a34637fc165f21
-
Filesize
869KB
MD530dd76d725a70f794ee06eab1b8f4f77
SHA1bc0a8d3e9ac1be5bd0caeb70b5a4511580a258c3
SHA25604affaf5ac9124656a363e040a898b457b1a1190de39cf9cf8f2349cce37d66d
SHA512672a032b9d61cd2b23fe1b45c69cb9038b103a8f01d1ddd874e2c6ecf5a3fe303700e1f70d2283cabd105c8b3e4dd8d7dd44539f4a13ce803a7772b5860b7d6f
-
Filesize
1.0MB
MD5e77c18ab4189c1e4111631f11a15d6a5
SHA1de61d89b227426000526ecf1659ebe3d16e063de
SHA2568d7667f5e70abbb8e6e0888900bf53771265aef7c6de4909963e49700b3f9f64
SHA512352d425966c21fa52d576801b312cb2cff98ccd3bb8a313a2eb3c6c4d8614b2a68b0fe98246aa80272ae25a61a55763a6d85ad282291f5f7029dbcea66c1ba92