Overview
overview
10Static
static
304a0e65087...2d.exe
windows10-2004-x64
100b23052e1d...05.exe
windows10-2004-x64
101319d83702...15.exe
windows10-2004-x64
1015bb5ac797...dd.exe
windows10-2004-x64
1019eb5c3dd8...ec.exe
windows10-2004-x64
102864919e9f...b7.exe
windows10-2004-x64
102f05412e59...2c.exe
windows10-2004-x64
103fd9e44b8d...84.exe
windows10-2004-x64
104920924329...b6.exe
windows10-2004-x64
106d6ab7a20c...33.exe
windows10-2004-x64
106e839edc16...b0.exe
windows10-2004-x64
106ff00efb56...f0.exe
windows10-2004-x64
107018985aa0...8e.exe
windows10-2004-x64
107b28b5b2ff...4e.exe
windows10-2004-x64
1093bee57b71...41.exe
windows10-2004-x64
10a22d19b8f1...9a.exe
windows10-2004-x64
10af3432152c...8d.exe
windows10-2004-x64
10bf27d39d4b...d1.exe
windows10-2004-x64
10db87d25edb...b5.exe
windows10-2004-x64
10f935568ec0...6c.exe
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1319d8370208b00e5260cfc0b8f145575c62bd43ab6f76605a992afeb6737f15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
15bb5ac797303fa462001ce5fd88a7bfc4702cd65f0a1768f9b994f6495a49dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19eb5c3dd82e78329d1d98ef6b119402fff11484aea9cfea0e3e1135eea669ec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2864919e9fd253aa62ab37d5b02410fa89dd3ead4618da0b908d3b41e73167b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4920924329af964d29e90b0bd3763c20450919411ad6b6ddabfd88061a7555b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6ff00efb56e1358cc67995d20e4e1edfffeb0789812a5cd830e2f477e16f63f0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7018985aa093121c146c37bf15499c6914c370d8b1e61fe98047260a3f0f5d8e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7b28b5b2ffa7298e1bc65ee1f5e49125dd2ae16da86952d43e4d1ac1e04c6e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
93bee57b7167fba61070c22f0c719ebb27499c5ff106633260f340e4917cf741.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a22d19b8f183bcd64a7c85a1e82f19e6db501a7e19b93ebc313864c2a0e6ce9a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f935568ec008833a6b510aaa18da8f703b0263d31ec0ee4a4442facb817a946c.exe
Resource
win10v2004-20240226-en
General
-
Target
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
-
Size
1.3MB
-
MD5
b1014daa354c943ac07bd77ccbb36ba0
-
SHA1
6308a52ccad0d1aa5d78d6b543c517029297d0da
-
SHA256
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833
-
SHA512
fa222739128e3ac2ec1d7c5730f0748bd67c5886445157f7517f87088096bd190773805721c52abc21ba998f85ae0f377edb52b1445eaed0a53b25b9c932d6c8
-
SSDEEP
24576:GyV82uVrfLBvFlIW7F9lymuQg0qx+wkKcCg8QsQdGiHibyue3teeQHW:VVIhzBFlIWpJyGCg8lQl0Xe9FQ
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral10/memory/3040-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral10/memory/3040-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral10/memory/3040-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x0007000000023460-40.dat family_redline behavioral10/memory/4944-42-0x00000000008D0000-0x000000000090E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1568 DU0GV2ro.exe 4232 Ai6vW5qG.exe 3408 hV6MS9sj.exe 1120 vF0rA2UI.exe 2556 1Tm22sn6.exe 4944 2Wu191OC.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" DU0GV2ro.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ai6vW5qG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" hV6MS9sj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vF0rA2UI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 3040 2556 1Tm22sn6.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 4116 2556 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1568 3048 6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe 84 PID 3048 wrote to memory of 1568 3048 6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe 84 PID 3048 wrote to memory of 1568 3048 6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe 84 PID 1568 wrote to memory of 4232 1568 DU0GV2ro.exe 85 PID 1568 wrote to memory of 4232 1568 DU0GV2ro.exe 85 PID 1568 wrote to memory of 4232 1568 DU0GV2ro.exe 85 PID 4232 wrote to memory of 3408 4232 Ai6vW5qG.exe 86 PID 4232 wrote to memory of 3408 4232 Ai6vW5qG.exe 86 PID 4232 wrote to memory of 3408 4232 Ai6vW5qG.exe 86 PID 3408 wrote to memory of 1120 3408 hV6MS9sj.exe 87 PID 3408 wrote to memory of 1120 3408 hV6MS9sj.exe 87 PID 3408 wrote to memory of 1120 3408 hV6MS9sj.exe 87 PID 1120 wrote to memory of 2556 1120 vF0rA2UI.exe 88 PID 1120 wrote to memory of 2556 1120 vF0rA2UI.exe 88 PID 1120 wrote to memory of 2556 1120 vF0rA2UI.exe 88 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 2556 wrote to memory of 3040 2556 1Tm22sn6.exe 90 PID 1120 wrote to memory of 4944 1120 vF0rA2UI.exe 95 PID 1120 wrote to memory of 4944 1120 vF0rA2UI.exe 95 PID 1120 wrote to memory of 4944 1120 vF0rA2UI.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe"C:\Users\Admin\AppData\Local\Temp\6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DU0GV2ro.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DU0GV2ro.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ai6vW5qG.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ai6vW5qG.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hV6MS9sj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hV6MS9sj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vF0rA2UI.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vF0rA2UI.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tm22sn6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Tm22sn6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 5807⤵
- Program crash
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Wu191OC.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Wu191OC.exe6⤵
- Executes dropped EXE
PID:4944
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2556 -ip 25561⤵PID:3112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD546c74c67e68161be405cb33896f3b06c
SHA1dec1a2268c4448fadb7a9e4f7df0214727451b59
SHA2562b9747d7ccf39f8782498aa96553e4c5012947cefbcf761ca6eb6389e331c090
SHA512d771b8f38437bb3798e70ce508a0a5821cd5a2aa36584c8807117543826bc4b366157e69c2a2862d3412e6a8cef01849f67cdc20fea5ca95c73980a16e13148f
-
Filesize
951KB
MD557e4d1525720e839e43fbb55a62859d4
SHA1408834c4613b7897a8935026b044048c7aa0f524
SHA2561ab83d9e2769c703b1d6d0be131ecd39acb0a35607166cc623ff46b941987eb1
SHA51231cbac57f17718163278c8c9fb59ed9dc85e19815a32379605088527737660c00ef5436dca7b774193bf61072388e55657ab2173bb4190c2e3ac2041edd645a3
-
Filesize
648KB
MD5910ee6352080e426ba3b40702996373a
SHA1e9c0b4a272f618740d76b7712bb15b22358fb64b
SHA2561342d3e9fb35595663b199db5254d30a7cec6476f767117784367e61a4c19708
SHA5122edd9d78ecdf3a7ee27ab4218ae3ea55fe64a460f5bf1e6ce87514845c55605508b5af91db42c2c4d9ad3f6a25044e0784c7303064736c0fb7deaa3df79b9cf2
-
Filesize
452KB
MD5bfb875022368f94bd37d189b6726d21e
SHA1d8a6f8f608c12016016c2ad41d51794f448501be
SHA25624578a40fe94df08bad3bbf32d8e3087ac9aae19ea01577cd7261975fda36798
SHA5124cf2da5fa84e8b11f7a74395e9e9b86b39f5aefc78ab46a842d3230424d48d74a5e475fc04e5a0d032497dc7894ef0a97ec7f9f3ddfbacb533ded04d46eca547
-
Filesize
449KB
MD5464384f130df5eff2bb2ea3331659866
SHA15aa26db0536f2e6e500dd35270ec63cf2b5583c9
SHA25674fa5d855c8c2ba4aac904d81fbfdb0d6b8fffcca9f8cae1ab72f7675db44b08
SHA5126dd90705568cc6fd34a7d63b4df05554bcdef0d4577ca4a34c648c924ab807a55b42053733d34d2a34e146060b1c8fc27e76d2515eceeeee1d3a1f534dc4db6b
-
Filesize
222KB
MD55cfec1c7fce7f18a95d3e72661991c32
SHA17c77d2b4751f3f131d20fece42db72b29657c8ab
SHA256e562dd8c2eed155b73e52946d1be66a8aef01bb41a332983073aa730112b6ff6
SHA51275949f34766b59bc9289d2a77b20aba7b49ae90ef8a8dfdd47628a5916a51c10b1bfa9ebb0a77ea448d328b09a83933660371f97df4273523cb9175171ae98a5