Overview
overview
10Static
static
304a0e65087...2d.exe
windows10-2004-x64
100b23052e1d...05.exe
windows10-2004-x64
101319d83702...15.exe
windows10-2004-x64
1015bb5ac797...dd.exe
windows10-2004-x64
1019eb5c3dd8...ec.exe
windows10-2004-x64
102864919e9f...b7.exe
windows10-2004-x64
102f05412e59...2c.exe
windows10-2004-x64
103fd9e44b8d...84.exe
windows10-2004-x64
104920924329...b6.exe
windows10-2004-x64
106d6ab7a20c...33.exe
windows10-2004-x64
106e839edc16...b0.exe
windows10-2004-x64
106ff00efb56...f0.exe
windows10-2004-x64
107018985aa0...8e.exe
windows10-2004-x64
107b28b5b2ff...4e.exe
windows10-2004-x64
1093bee57b71...41.exe
windows10-2004-x64
10a22d19b8f1...9a.exe
windows10-2004-x64
10af3432152c...8d.exe
windows10-2004-x64
10bf27d39d4b...d1.exe
windows10-2004-x64
10db87d25edb...b5.exe
windows10-2004-x64
10f935568ec0...6c.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1319d8370208b00e5260cfc0b8f145575c62bd43ab6f76605a992afeb6737f15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
15bb5ac797303fa462001ce5fd88a7bfc4702cd65f0a1768f9b994f6495a49dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19eb5c3dd82e78329d1d98ef6b119402fff11484aea9cfea0e3e1135eea669ec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2864919e9fd253aa62ab37d5b02410fa89dd3ead4618da0b908d3b41e73167b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4920924329af964d29e90b0bd3763c20450919411ad6b6ddabfd88061a7555b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6ff00efb56e1358cc67995d20e4e1edfffeb0789812a5cd830e2f477e16f63f0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7018985aa093121c146c37bf15499c6914c370d8b1e61fe98047260a3f0f5d8e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7b28b5b2ffa7298e1bc65ee1f5e49125dd2ae16da86952d43e4d1ac1e04c6e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
93bee57b7167fba61070c22f0c719ebb27499c5ff106633260f340e4917cf741.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a22d19b8f183bcd64a7c85a1e82f19e6db501a7e19b93ebc313864c2a0e6ce9a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f935568ec008833a6b510aaa18da8f703b0263d31ec0ee4a4442facb817a946c.exe
Resource
win10v2004-20240226-en
General
-
Target
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
-
Size
918KB
-
MD5
56cdba87bcc5804d404098869b844a90
-
SHA1
2bd2f5db4c77f6c10988d82c8da316eb766dc7b9
-
SHA256
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d
-
SHA512
a20fdff62ab3f1abd82937e7be987a549b68bdfe02cdf26bed82850d3ca9f9a4ded8324808dd6e93bad8ffb3f2e83db387460c75208b528c5d6c439e8506e380
-
SSDEEP
12288:fMrsy90GXeQX658y7lzrLZJFsYIjHf3UI/P4zONjpbfLhDPDSvJeR6maLZZulS:XyiQq58Cl9J4jHcI/PaWBf4o0N0S
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral17/memory/3028-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral17/memory/3028-31-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral17/memory/3028-29-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0619132.exe family_redline behavioral17/memory/5076-35-0x0000000000FB0000-0x0000000000FE0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
x5402654.exex3676888.exex4023578.exeg3391768.exeh0619132.exepid process 4560 x5402654.exe 912 x3676888.exe 3612 x4023578.exe 1796 g3391768.exe 5076 h0619132.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exex5402654.exex3676888.exex4023578.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5402654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3676888.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4023578.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g3391768.exedescription pid process target process PID 1796 set thread context of 3028 1796 g3391768.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3248 1796 WerFault.exe g3391768.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exex5402654.exex3676888.exex4023578.exeg3391768.exedescription pid process target process PID 1212 wrote to memory of 4560 1212 af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe x5402654.exe PID 1212 wrote to memory of 4560 1212 af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe x5402654.exe PID 1212 wrote to memory of 4560 1212 af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe x5402654.exe PID 4560 wrote to memory of 912 4560 x5402654.exe x3676888.exe PID 4560 wrote to memory of 912 4560 x5402654.exe x3676888.exe PID 4560 wrote to memory of 912 4560 x5402654.exe x3676888.exe PID 912 wrote to memory of 3612 912 x3676888.exe x4023578.exe PID 912 wrote to memory of 3612 912 x3676888.exe x4023578.exe PID 912 wrote to memory of 3612 912 x3676888.exe x4023578.exe PID 3612 wrote to memory of 1796 3612 x4023578.exe g3391768.exe PID 3612 wrote to memory of 1796 3612 x4023578.exe g3391768.exe PID 3612 wrote to memory of 1796 3612 x4023578.exe g3391768.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 1796 wrote to memory of 3028 1796 g3391768.exe AppLaunch.exe PID 3612 wrote to memory of 5076 3612 x4023578.exe h0619132.exe PID 3612 wrote to memory of 5076 3612 x4023578.exe h0619132.exe PID 3612 wrote to memory of 5076 3612 x4023578.exe h0619132.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe"C:\Users\Admin\AppData\Local\Temp\af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5402654.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5402654.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3676888.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3676888.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4023578.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4023578.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3391768.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3391768.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 1406⤵
- Program crash
PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0619132.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0619132.exe5⤵
- Executes dropped EXE
PID:5076
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1796 -ip 17961⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5ae900830d76b3a0e92656e799d000b40
SHA1a6a41ab8eb354912385377f6d85f4df640f20c63
SHA2561a58b516e32e9dfa94bb88c015eb809c78b726db0fc197d6e02897d82e4dc8e9
SHA512c3cd8bc076cc81a14256797d9dd7793aaf33d264946c8164fe947e060dff221150e489508b6320dac4700bbdf10037e161669ae13e14a14c1a35aba60857d64e
-
Filesize
556KB
MD5a6156c498665816ff8e9ab71779cb28c
SHA109cb5c62f11bd9830408d675f3c63e210d88c9a1
SHA25662514edcbcdbe96e3b7184c3005d6ebbaddd3a37b8b02b0ca5ee5a23db34f719
SHA512a5751a95c32622af4084c38fd725cc75f73a80e97c3dc9c9cc5de9366602d10c921168ec66f71ae5badbe814104954a86cbeb15093dddfeb7b2980ee27487162
-
Filesize
390KB
MD57e2e7dc70f56df548232a9dd7556bdb9
SHA19fc6a5235b7795d8c562ac7e52d332d6b25b3d6c
SHA2564bde3e1dee15f8b586369b6a11cc40ac734abd8c9a4d72022dc045bf81eeb0ba
SHA5122868f38842b06ee86b7a7d8bbe6f4d796bdbe837f65f642a63f8f2da98667f526ff589c77b4466551658122f560edf86ed01df137aae6ad88e3c1d4806bffef7
-
Filesize
356KB
MD5e46b86cc64667be01bbf33c5082c6ede
SHA1b0ebf488952ea67b44db24a2addd621486386acb
SHA2560a397c3992e710686f9305edd1c441b9802ba1d6ed8eb5c7da6c25bbafc75e69
SHA5127e10ab88d0b3fbbb3427e9e816fbb7fc9f251ad1b8b6babe60212049878c119a9d5ed5ed2a6d1fe07292201c976accf783a9444cc2d159a8545e88e9cdac208d
-
Filesize
174KB
MD53fc04c2663ebf50c1c36280a51f0719b
SHA14ba492fb247024512393153720277015bc59e041
SHA256683750e659e7e2d9a97a0abf5955f1231ea78b5dda12423a418051a368869902
SHA512e34395edaf5239b20437de2959940a419ab3fb2d8f775f5215d84c60d546f4a398a16117f04e656e03b88755d0e98ba1a24209450dbb45fb2bd1740ce5cd2a78