Overview
overview
10Static
static
315dbe47ffc...c2.exe
windows10-2004-x64
10259d304678...83.exe
windows10-2004-x64
102692caca2a...20.exe
windows10-2004-x64
1028a50ab6e2...10.exe
windows10-2004-x64
104c05a0a402...f4.exe
windows10-2004-x64
105a9aed6661...2d.exe
windows10-2004-x64
105f5fe0dfe7...ca.exe
windows10-2004-x64
106b5a910219...c6.exe
windows10-2004-x64
106d91ecfeed...9b.exe
windows7-x64
106d91ecfeed...9b.exe
windows10-2004-x64
106ffb586f67...d9.exe
windows10-2004-x64
1073c6d3d5d7...90.exe
windows10-2004-x64
1075b625c13b...07.exe
windows10-2004-x64
108a4cf22002...f5.exe
windows7-x64
108a4cf22002...f5.exe
windows10-2004-x64
10aa03da34a3...c3.exe
windows10-2004-x64
10c4259cbbbe...3b.exe
windows10-2004-x64
10c71d93f739...fb.exe
windows10-2004-x64
10c98c961b6f...67.exe
windows10-2004-x64
10d76ee17b4a...b8.exe
windows10-2004-x64
7ec3af3633a...54.exe
windows10-2004-x64
10fbb293bc8b...e5.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
15dbe47ffc282036b5b74c9775a05b1985197b01705a5e5240936b02f6f8c2c2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
259d304678a712b51f1187d33ecd946f12224f4900cad091b3a39900d04e9d83.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2692caca2a880cb62bad959791f7e78945d5e600364901df7fc8de45a268a520.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
28a50ab6e2f0c1302196528ba89864cb218567116ae9f4a7ff25ad2517acf510.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4c05a0a402e12dd4248772fa3577f38e1fc9b8b060c219cf8a4890bfce5439f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5a9aed66614843df861e1716ffa1565f310d3f61f384e45ac0468be8b6bc162d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
5f5fe0dfe7abbcda9826593f0816a3b72630e87a3d058a3382b48820dfc0f3ca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6b5a910219dbef3059255fe4700c0b661a248a20051c4624275c60fcb969a4c6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6d91ecfeedfc048e057ef390c0a9a12a14dd8dadc74b44e7d17e7d767fa6fb9b.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
6d91ecfeedfc048e057ef390c0a9a12a14dd8dadc74b44e7d17e7d767fa6fb9b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
6ffb586f674fda7588cfb5e9ebac49e43e607069c4c43597e624fc42ac70b8d9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
73c6d3d5d789b4c1b22119cf829a0a27609d598ad9afb0d622c8abb66982bf90.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
75b625c13b24d7458adfc514723864292401468613eaedafdba252e90b3f5707.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
8a4cf2200249c16ad339a708d70a7a76427cc48fe52e324e22cb2b14c043a4f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
8a4cf2200249c16ad339a708d70a7a76427cc48fe52e324e22cb2b14c043a4f5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
aa03da34a3df5ccd4a8378896e723e73365b3d7713664fcafe751f873108dcc3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c4259cbbbeecc45ba6b72e216489e0c0f668de9a18069a255c88f5440350243b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
c71d93f73909af1aaed89e205cf18f3305701f5725a7f73bc47959ec2fe389fb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
c98c961b6fafcd423b7f00c273b1de0344bce9a806fb75483a3ed9f8f686a467.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d76ee17b4a6047aa98a5b0abc7a035b345706ef3087c8b527b238db6e24fdbb8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
fbb293bc8b089d284989e99bec9363092a97e4084b29e5eeb9d9ac35568bb7e5.exe
Resource
win10v2004-20240426-en
General
-
Target
ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe
-
Size
991KB
-
MD5
f68673838cfdf0022d6c83718855e777
-
SHA1
e6f2d528fd01636b01e25e9d13820d2ee98e6685
-
SHA256
ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54
-
SHA512
913477ffae714db951880d9097d310cdaf6c440db34d13c6bb48b7ac2e5afe3fc27bb20cbce8f7fe65374a3c6911b3ee389b47b4749764774eacf353734f3215
-
SSDEEP
24576:cybquWadjzZbfJ0bQlr8RVFiMB2ahB/Vbtys:Lp1djFbfJG0BMvf
Malware Config
Extracted
redline
magia
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral21/memory/4932-56-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral21/memory/4932-57-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral21/memory/4932-59-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1Ew15De9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1Ew15De9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1Ew15De9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1Ew15De9.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1Ew15De9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1Ew15De9.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral21/memory/4668-67-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 3360 fY9bx11.exe 1732 AB0Cg45.exe 2720 1Ew15De9.exe 3728 2Wr3587.exe 4640 3ZA20EP.exe 680 4og835Ic.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1Ew15De9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1Ew15De9.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fY9bx11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" AB0Cg45.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3728 set thread context of 4932 3728 2Wr3587.exe 97 PID 4640 set thread context of 2348 4640 3ZA20EP.exe 103 PID 680 set thread context of 4668 680 4og835Ic.exe 108 -
Program crash 3 IoCs
pid pid_target Process procid_target 2160 3728 WerFault.exe 95 940 4640 WerFault.exe 101 4448 680 WerFault.exe 106 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 1Ew15De9.exe 2720 1Ew15De9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 1Ew15De9.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3360 4944 ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe 82 PID 4944 wrote to memory of 3360 4944 ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe 82 PID 4944 wrote to memory of 3360 4944 ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe 82 PID 3360 wrote to memory of 1732 3360 fY9bx11.exe 83 PID 3360 wrote to memory of 1732 3360 fY9bx11.exe 83 PID 3360 wrote to memory of 1732 3360 fY9bx11.exe 83 PID 1732 wrote to memory of 2720 1732 AB0Cg45.exe 84 PID 1732 wrote to memory of 2720 1732 AB0Cg45.exe 84 PID 1732 wrote to memory of 2720 1732 AB0Cg45.exe 84 PID 1732 wrote to memory of 3728 1732 AB0Cg45.exe 95 PID 1732 wrote to memory of 3728 1732 AB0Cg45.exe 95 PID 1732 wrote to memory of 3728 1732 AB0Cg45.exe 95 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3728 wrote to memory of 4932 3728 2Wr3587.exe 97 PID 3360 wrote to memory of 4640 3360 fY9bx11.exe 101 PID 3360 wrote to memory of 4640 3360 fY9bx11.exe 101 PID 3360 wrote to memory of 4640 3360 fY9bx11.exe 101 PID 4640 wrote to memory of 2348 4640 3ZA20EP.exe 103 PID 4640 wrote to memory of 2348 4640 3ZA20EP.exe 103 PID 4640 wrote to memory of 2348 4640 3ZA20EP.exe 103 PID 4640 wrote to memory of 2348 4640 3ZA20EP.exe 103 PID 4640 wrote to memory of 2348 4640 3ZA20EP.exe 103 PID 4640 wrote to memory of 2348 4640 3ZA20EP.exe 103 PID 4944 wrote to memory of 680 4944 ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe 106 PID 4944 wrote to memory of 680 4944 ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe 106 PID 4944 wrote to memory of 680 4944 ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe 106 PID 680 wrote to memory of 4668 680 4og835Ic.exe 108 PID 680 wrote to memory of 4668 680 4og835Ic.exe 108 PID 680 wrote to memory of 4668 680 4og835Ic.exe 108 PID 680 wrote to memory of 4668 680 4og835Ic.exe 108 PID 680 wrote to memory of 4668 680 4og835Ic.exe 108 PID 680 wrote to memory of 4668 680 4og835Ic.exe 108 PID 680 wrote to memory of 4668 680 4og835Ic.exe 108 PID 680 wrote to memory of 4668 680 4og835Ic.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe"C:\Users\Admin\AppData\Local\Temp\ec3af3633a52750aaf806f34de5b8fb483a77417b0a8182b5cd0f8fe892b0c54.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fY9bx11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fY9bx11.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AB0Cg45.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AB0Cg45.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Ew15De9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Ew15De9.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Wr3587.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Wr3587.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 5965⤵
- Program crash
PID:2160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3ZA20EP.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3ZA20EP.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 1524⤵
- Program crash
PID:940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4og835Ic.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4og835Ic.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 1523⤵
- Program crash
PID:4448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3728 -ip 37281⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4640 -ip 46401⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 680 -ip 6801⤵PID:900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD543de8c0acdae428cb27f753fd7ed1389
SHA1ff44121e2a5fb6e8bbc2309a4b666da30c737c0f
SHA256755678dbd036fc42889e943fbb77de34cb73d4feca8fd07c7208b13486c64fbb
SHA5129c40c3ef66bddd18bbdc3ebaff3486c6de2c2d7bf95b93977422155c608fa59bb3ffc62a94eb2ae8600186b6c3dab8f22db3d2471079c7042620067d23c41e1c
-
Filesize
696KB
MD578d9acb8de3b72d9a742a2b70f6c76f6
SHA17a4d6ea227fab57a4016987fdd592282ed798a9e
SHA25692a1c0a698565601c42a8a82d6244d4a901189c48e079b98a10b5ea5c114fd83
SHA512ba6c86a53c9843b5858934e42aed665a00019ffd1c396e531830967f3855d28eb0eb477ed12386b7a0ab4cef3aeee446c70d704812a8b30a6813c65421ff5794
-
Filesize
268KB
MD564f6170db232dcd4fc20a74a31462f64
SHA1a6e8eb37c8a394a5b298c2e0ef0b0f69ea71694d
SHA2563c21f4198422d8ca82b45969725111e385224b9af552ff95f09be05de51a331a
SHA5124ace09e01bed9651344e2fd18d4753f03b371406ac69df5d7adac0b1db17664b9e6b8654ef6a239e96bfb91e702c606a263e324f5fc43ae8fa81467de9aed3fa
-
Filesize
452KB
MD55f2ae759be8b853043e00102662315bf
SHA1981bbee76fc13ef00f650577034493a517c74918
SHA256c2e61e4e24fc2dcac36ceda4ea1dc90225ca2179cf82b2dabe43ffba27e5b72c
SHA512f6787e6d4f024a2b08f6b467bf9f5451c9b0b17f02f2f36c74cca0e4f03948f240408e411e545b74d475df38aa09c97343168b4b3f1f209cb0fca879b67e59f3
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
378KB
MD5c8c838184e3dc920cb4accacc0c1231d
SHA1ff97e857ecef259833a66aac7a51488c3f32d45c
SHA2560b25b91180e180073251ca6fbf96e511b8cc13fc62c67c4c3fafe2782c1eda4a
SHA51212573d5c0d039d4b8bb3b613df87e137cf3fdcaeb55cc12e7a029a004264c517bbcc9d5b6f323957e8a97d3201d103755d0c2c3aa242dc0f00793df6d1b72eb4