Overview
overview
10Static
static
304a0e65087...2d.exe
windows10-2004-x64
100b23052e1d...05.exe
windows10-2004-x64
101319d83702...15.exe
windows10-2004-x64
1015bb5ac797...dd.exe
windows10-2004-x64
1019eb5c3dd8...ec.exe
windows10-2004-x64
102864919e9f...b7.exe
windows10-2004-x64
102f05412e59...2c.exe
windows10-2004-x64
103fd9e44b8d...84.exe
windows10-2004-x64
104920924329...b6.exe
windows10-2004-x64
106d6ab7a20c...33.exe
windows10-2004-x64
106e839edc16...b0.exe
windows10-2004-x64
106ff00efb56...f0.exe
windows10-2004-x64
107018985aa0...8e.exe
windows10-2004-x64
107b28b5b2ff...4e.exe
windows10-2004-x64
1093bee57b71...41.exe
windows10-2004-x64
10a22d19b8f1...9a.exe
windows10-2004-x64
10af3432152c...8d.exe
windows10-2004-x64
10bf27d39d4b...d1.exe
windows10-2004-x64
10db87d25edb...b5.exe
windows10-2004-x64
10f935568ec0...6c.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1319d8370208b00e5260cfc0b8f145575c62bd43ab6f76605a992afeb6737f15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
15bb5ac797303fa462001ce5fd88a7bfc4702cd65f0a1768f9b994f6495a49dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19eb5c3dd82e78329d1d98ef6b119402fff11484aea9cfea0e3e1135eea669ec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2864919e9fd253aa62ab37d5b02410fa89dd3ead4618da0b908d3b41e73167b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4920924329af964d29e90b0bd3763c20450919411ad6b6ddabfd88061a7555b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6ff00efb56e1358cc67995d20e4e1edfffeb0789812a5cd830e2f477e16f63f0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7018985aa093121c146c37bf15499c6914c370d8b1e61fe98047260a3f0f5d8e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7b28b5b2ffa7298e1bc65ee1f5e49125dd2ae16da86952d43e4d1ac1e04c6e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
93bee57b7167fba61070c22f0c719ebb27499c5ff106633260f340e4917cf741.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a22d19b8f183bcd64a7c85a1e82f19e6db501a7e19b93ebc313864c2a0e6ce9a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f935568ec008833a6b510aaa18da8f703b0263d31ec0ee4a4442facb817a946c.exe
Resource
win10v2004-20240226-en
General
-
Target
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
-
Size
1.5MB
-
MD5
d2112cdc189a119c9bd4e3cf5a8f5a7c
-
SHA1
e71798987b95e1e59bebb835653dfe6cdb6ee122
-
SHA256
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0
-
SHA512
966fb8bc4211c540eecddcba68b9bac4be7977ef1525a657289bb0bc8234b1e94933ed8d9a8a2e0bd54fbfd370ff9d1222f1bca0931522a2c8193c7a3ccf7122
-
SSDEEP
24576:QyticKpXK7wbmja4ZFH5Nz9OTdB+7AF4lDK76GeZWsrF115xJ49JEvOcFU/+:XtiGkbSZFH5FkTu7XELCD15xyHEGcF
Malware Config
Extracted
redline
kedru
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral11/memory/3096-35-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral11/memory/3096-36-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral11/memory/3096-38-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ZZ316xY.exe family_redline behavioral11/memory/2644-42-0x0000000000E10000-0x0000000000E4C000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
BW0Rk5fY.exehh7ff3lX.exeru3tu8sp.exeFM8Ef9UM.exe1wl76zD0.exe2ZZ316xY.exepid process 4152 BW0Rk5fY.exe 3544 hh7ff3lX.exe 692 ru3tu8sp.exe 3604 FM8Ef9UM.exe 4848 1wl76zD0.exe 2644 2ZZ316xY.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
hh7ff3lX.exeru3tu8sp.exeFM8Ef9UM.exe6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exeBW0Rk5fY.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" hh7ff3lX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ru3tu8sp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" FM8Ef9UM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" BW0Rk5fY.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1wl76zD0.exedescription pid process target process PID 4848 set thread context of 3096 4848 1wl76zD0.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exeBW0Rk5fY.exehh7ff3lX.exeru3tu8sp.exeFM8Ef9UM.exe1wl76zD0.exedescription pid process target process PID 3220 wrote to memory of 4152 3220 6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe BW0Rk5fY.exe PID 3220 wrote to memory of 4152 3220 6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe BW0Rk5fY.exe PID 3220 wrote to memory of 4152 3220 6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe BW0Rk5fY.exe PID 4152 wrote to memory of 3544 4152 BW0Rk5fY.exe hh7ff3lX.exe PID 4152 wrote to memory of 3544 4152 BW0Rk5fY.exe hh7ff3lX.exe PID 4152 wrote to memory of 3544 4152 BW0Rk5fY.exe hh7ff3lX.exe PID 3544 wrote to memory of 692 3544 hh7ff3lX.exe ru3tu8sp.exe PID 3544 wrote to memory of 692 3544 hh7ff3lX.exe ru3tu8sp.exe PID 3544 wrote to memory of 692 3544 hh7ff3lX.exe ru3tu8sp.exe PID 692 wrote to memory of 3604 692 ru3tu8sp.exe FM8Ef9UM.exe PID 692 wrote to memory of 3604 692 ru3tu8sp.exe FM8Ef9UM.exe PID 692 wrote to memory of 3604 692 ru3tu8sp.exe FM8Ef9UM.exe PID 3604 wrote to memory of 4848 3604 FM8Ef9UM.exe 1wl76zD0.exe PID 3604 wrote to memory of 4848 3604 FM8Ef9UM.exe 1wl76zD0.exe PID 3604 wrote to memory of 4848 3604 FM8Ef9UM.exe 1wl76zD0.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 4848 wrote to memory of 3096 4848 1wl76zD0.exe AppLaunch.exe PID 3604 wrote to memory of 2644 3604 FM8Ef9UM.exe 2ZZ316xY.exe PID 3604 wrote to memory of 2644 3604 FM8Ef9UM.exe 2ZZ316xY.exe PID 3604 wrote to memory of 2644 3604 FM8Ef9UM.exe 2ZZ316xY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe"C:\Users\Admin\AppData\Local\Temp\6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BW0Rk5fY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BW0Rk5fY.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hh7ff3lX.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hh7ff3lX.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ru3tu8sp.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ru3tu8sp.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\FM8Ef9UM.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\FM8Ef9UM.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wl76zD0.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wl76zD0.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ZZ316xY.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ZZ316xY.exe6⤵
- Executes dropped EXE
PID:2644
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54e2fd2cf972dfe9a188250efc5685978
SHA1421bda5b30739ca4399a9604fdf663660a8a9001
SHA25693bd200c6e6dab485b22c608b033767aef36f62ab03a9a1de07e9be8dbd2b0fd
SHA512261866d14aebea4d02ddec0cdde4ca91f432f38f4b397505813fbe1bdf9d23cdcab496a041687ced3e73667d4f4fb8d07bd3db9c628407515ea8c5a4301c45e1
-
Filesize
1.1MB
MD511168fad35c2f4f5aa43f3716867f800
SHA1ead3272f10a39e1797402a9e0d6436cc4627503d
SHA256e00c69f5eb2f4921cbc0b0b3e45e8842070977ef3abe31e1548a6b2c4ba34f00
SHA512599af17e6b9a940dbfdddfb62962fb3603f8e780d05bb6d57c03bef701e9dc3b15cb93b5ef0889c722b6443a565c2229de3ad4fe66dbe16a405c4b3c3dca5d52
-
Filesize
753KB
MD54ba954b35149b0678fce0f391e1f0705
SHA18e32ff5055f9bf33adad410ce05694f4efd03c15
SHA2567464c432da4d8e7eaf492c18c49a749abe035faffc4f04f4552e8a04fb52eb09
SHA5124b93006f8dac5d25a8f37a15ac400984b74c7a7d55a16ce85d80c509a360a652b237e328d8057072cc422a6b3008e634e6ceda2eb599b3df61361a12f750d719
-
Filesize
558KB
MD5350f212746bbeaf863e0063865e72d36
SHA1833454e4723fa2b275d049c1db1b43891b52ef0d
SHA256bf805f52508519f138c3df4deb0bccd40261bb9614208ff7eb774fafb0fd6932
SHA512210cfa2506706885cc7d8e1a7c95c7846ccd7d950ea92b289cc1249231eceb0b9176d5ba5a8d21825c4af7fc2ca665d95436a9733105238de63b62b52bee4e25
-
Filesize
1.0MB
MD5523d76045f22339917aefe41ae41704f
SHA1c54275d9530f379b9abc267e2a9a6f9505aaa8cb
SHA256a86f5864d693e97e75af0819271ca3ef71e7a63992ba9a63d0b21a6f2ccc15de
SHA512cc8ef724f9eb2c9ff4c18a116d233e9380be69772536887cf95500aa2311f79d482cd176ef1b954079f181275485d9ea550bad0885b1f82e14ca05f9ca5a8d1a
-
Filesize
219KB
MD5146f2e7de71760385abff3da409fa82a
SHA1428b9ea9a89f33aaa18da75b2bc65e634b1e9276
SHA25659c7f2bd4c0f06819b9b46ff73323405f1b098a54a502cd348bfd9a9f6b3604d
SHA5122beff7dd19908475b18b2ed1e6615adf575fb498d70bb17b48683004928eb349f685de7df21d1d56bcd0b77787e59924b66b0d11dca87b41f1b7987ea96084f0