Overview
overview
10Static
static
315dbe47ffc...c2.exe
windows10-2004-x64
10259d304678...83.exe
windows10-2004-x64
102692caca2a...20.exe
windows10-2004-x64
1028a50ab6e2...10.exe
windows10-2004-x64
104c05a0a402...f4.exe
windows10-2004-x64
105a9aed6661...2d.exe
windows10-2004-x64
105f5fe0dfe7...ca.exe
windows10-2004-x64
106b5a910219...c6.exe
windows10-2004-x64
106d91ecfeed...9b.exe
windows7-x64
106d91ecfeed...9b.exe
windows10-2004-x64
106ffb586f67...d9.exe
windows10-2004-x64
1073c6d3d5d7...90.exe
windows10-2004-x64
1075b625c13b...07.exe
windows10-2004-x64
108a4cf22002...f5.exe
windows7-x64
108a4cf22002...f5.exe
windows10-2004-x64
10aa03da34a3...c3.exe
windows10-2004-x64
10c4259cbbbe...3b.exe
windows10-2004-x64
10c71d93f739...fb.exe
windows10-2004-x64
10c98c961b6f...67.exe
windows10-2004-x64
10d76ee17b4a...b8.exe
windows10-2004-x64
7ec3af3633a...54.exe
windows10-2004-x64
10fbb293bc8b...e5.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
15dbe47ffc282036b5b74c9775a05b1985197b01705a5e5240936b02f6f8c2c2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
259d304678a712b51f1187d33ecd946f12224f4900cad091b3a39900d04e9d83.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2692caca2a880cb62bad959791f7e78945d5e600364901df7fc8de45a268a520.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
28a50ab6e2f0c1302196528ba89864cb218567116ae9f4a7ff25ad2517acf510.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4c05a0a402e12dd4248772fa3577f38e1fc9b8b060c219cf8a4890bfce5439f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5a9aed66614843df861e1716ffa1565f310d3f61f384e45ac0468be8b6bc162d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
5f5fe0dfe7abbcda9826593f0816a3b72630e87a3d058a3382b48820dfc0f3ca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6b5a910219dbef3059255fe4700c0b661a248a20051c4624275c60fcb969a4c6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6d91ecfeedfc048e057ef390c0a9a12a14dd8dadc74b44e7d17e7d767fa6fb9b.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
6d91ecfeedfc048e057ef390c0a9a12a14dd8dadc74b44e7d17e7d767fa6fb9b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
6ffb586f674fda7588cfb5e9ebac49e43e607069c4c43597e624fc42ac70b8d9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
73c6d3d5d789b4c1b22119cf829a0a27609d598ad9afb0d622c8abb66982bf90.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
75b625c13b24d7458adfc514723864292401468613eaedafdba252e90b3f5707.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
8a4cf2200249c16ad339a708d70a7a76427cc48fe52e324e22cb2b14c043a4f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
8a4cf2200249c16ad339a708d70a7a76427cc48fe52e324e22cb2b14c043a4f5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c4259cbbbeecc45ba6b72e216489e0c0f668de9a18069a255c88f5440350243b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
c71d93f73909af1aaed89e205cf18f3305701f5725a7f73bc47959ec2fe389fb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d76ee17b4a6047aa98a5b0abc7a035b345706ef3087c8b527b238db6e24fdbb8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
fbb293bc8b089d284989e99bec9363092a97e4084b29e5eeb9d9ac35568bb7e5.exe
Resource
win10v2004-20240426-en
General
-
Target
c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe
-
Size
1005KB
-
MD5
2f7a5b2d59577659c9f080663409717c
-
SHA1
a98855facd4097093341b6e4f1a896661cf9cbd0
-
SHA256
c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467
-
SHA512
ad2c86f149cb756c89a3325526845dfa1b3be20bc5fbc7a2db5bfef1c7910fec36fb1eefb72fbf5fdcfe85e8decac2eb4e02423f8ec9cf6e1db5922ece1b1f72
-
SSDEEP
24576:7y4fy2UEUYhiAFoXAvwOCP+sy0aX3DcsbrkBoV:u4fy2XUYhiAFpvwvGsy0aX37Hv
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral19/memory/4216-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral19/memory/4216-31-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral19/memory/4216-29-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023423-33.dat family_redline behavioral19/memory/1540-35-0x0000000000D90000-0x0000000000DCE000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 4012 dB9IQ0Gk.exe 4108 Rt8fE6in.exe 1580 PQ0EJ6ve.exe 1888 1Vw19RJ5.exe 1540 2WE744aS.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dB9IQ0Gk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Rt8fE6in.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" PQ0EJ6ve.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1888 set thread context of 4216 1888 1Vw19RJ5.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 660 1888 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1952 wrote to memory of 4012 1952 c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe 83 PID 1952 wrote to memory of 4012 1952 c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe 83 PID 1952 wrote to memory of 4012 1952 c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe 83 PID 4012 wrote to memory of 4108 4012 dB9IQ0Gk.exe 84 PID 4012 wrote to memory of 4108 4012 dB9IQ0Gk.exe 84 PID 4012 wrote to memory of 4108 4012 dB9IQ0Gk.exe 84 PID 4108 wrote to memory of 1580 4108 Rt8fE6in.exe 86 PID 4108 wrote to memory of 1580 4108 Rt8fE6in.exe 86 PID 4108 wrote to memory of 1580 4108 Rt8fE6in.exe 86 PID 1580 wrote to memory of 1888 1580 PQ0EJ6ve.exe 87 PID 1580 wrote to memory of 1888 1580 PQ0EJ6ve.exe 87 PID 1580 wrote to memory of 1888 1580 PQ0EJ6ve.exe 87 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1888 wrote to memory of 4216 1888 1Vw19RJ5.exe 90 PID 1580 wrote to memory of 1540 1580 PQ0EJ6ve.exe 95 PID 1580 wrote to memory of 1540 1580 PQ0EJ6ve.exe 95 PID 1580 wrote to memory of 1540 1580 PQ0EJ6ve.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe"C:\Users\Admin\AppData\Local\Temp\c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dB9IQ0Gk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dB9IQ0Gk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rt8fE6in.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rt8fE6in.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PQ0EJ6ve.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PQ0EJ6ve.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vw19RJ5.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vw19RJ5.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 5846⤵
- Program crash
PID:660
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2WE744aS.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2WE744aS.exe5⤵
- Executes dropped EXE
PID:1540
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1888 -ip 18881⤵PID:1864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD5e61438bf50fa379d8f0e046af18e98de
SHA16546df9342b8311d4dfbf5a5d220a506b12823ad
SHA25633f15d26878b06fdf0eae71e0903ab0ef0ba65dd66f0c6466770d3084b7bc53e
SHA5127548e28433e42d01ad3698b40e8deac2f3d709173f15ab1c65bfb4fec415c09db4f7a3d178a5947e663ef9beb8680f7c26e7700a0dbcf247c71b02b3b3eb9110
-
Filesize
582KB
MD5365bf18802322014427f5a2f557f1fb4
SHA1a17ee175fec5cf3583e8ff1830b9da866814eed6
SHA2560b7ac73bf5d443f858cad012b2ea27f732aaf1ff76817c5c9f73e335e7448b10
SHA5123c7272839c2e7e4bd161176a961a97455761307b688ba2c88c9275b6e64ab6fef7bd73ab9ffa12b0d78a397d4456ab605ee5ee632db4698fdf526b080ed00e88
-
Filesize
382KB
MD54c260492495ca9100ad564320bc16fc2
SHA11f2d944942167abe9d3209a5f152440c706d13c5
SHA256a1ec767e15c9691a097496a736e1ec0257f9db125eaed09c15424e6148c649ac
SHA5120c86b2a0d3b8408706bb350a6ebb0c7ce68f070afbb945cb46338b4b7a870b0f1a047382872b82e5e0c1efba6ab71d8d96ba09192ac54fba0ad8f4f237b9aa0b
-
Filesize
295KB
MD5fd1675920d36bebbb571ca205273f3ac
SHA19122391deaba2d3614223e1418dc4bb39347060d
SHA25633173d0102492800edf2517658cbc4eddef70f29fab6e34b85996aa6695c944b
SHA512a65dfe7d1a906f2173b06cb7085f19705ce0c41918fc6919d27e90751bd8fc13ba61e15801833d25c2a6bb574d3403ad34cc85ed40140aa2aa81ae3823f553aa
-
Filesize
222KB
MD5fc0ef98d09009bade85c3b93f1b8ced3
SHA1158800921fb50653b704f64e9bced77a68750a88
SHA256d34176d2073da06707441675693cf06174b8fa04fd45a1806b09f588cb60e6b3
SHA512057cbca8e3711f413a0d3e1cfca3f6fc646f471912381c83067329c6a285acbdd23d093218f0c82a8673dce5e18b66702d9ccea0887d73d2f51f28c725a4a9db