Overview
overview
10Static
static
304a0e65087...2d.exe
windows10-2004-x64
100b23052e1d...05.exe
windows10-2004-x64
101319d83702...15.exe
windows10-2004-x64
1015bb5ac797...dd.exe
windows10-2004-x64
1019eb5c3dd8...ec.exe
windows10-2004-x64
102864919e9f...b7.exe
windows10-2004-x64
102f05412e59...2c.exe
windows10-2004-x64
103fd9e44b8d...84.exe
windows10-2004-x64
104920924329...b6.exe
windows10-2004-x64
106d6ab7a20c...33.exe
windows10-2004-x64
106e839edc16...b0.exe
windows10-2004-x64
106ff00efb56...f0.exe
windows10-2004-x64
107018985aa0...8e.exe
windows10-2004-x64
107b28b5b2ff...4e.exe
windows10-2004-x64
1093bee57b71...41.exe
windows10-2004-x64
10a22d19b8f1...9a.exe
windows10-2004-x64
10af3432152c...8d.exe
windows10-2004-x64
10bf27d39d4b...d1.exe
windows10-2004-x64
10db87d25edb...b5.exe
windows10-2004-x64
10f935568ec0...6c.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1319d8370208b00e5260cfc0b8f145575c62bd43ab6f76605a992afeb6737f15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
15bb5ac797303fa462001ce5fd88a7bfc4702cd65f0a1768f9b994f6495a49dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19eb5c3dd82e78329d1d98ef6b119402fff11484aea9cfea0e3e1135eea669ec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2864919e9fd253aa62ab37d5b02410fa89dd3ead4618da0b908d3b41e73167b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4920924329af964d29e90b0bd3763c20450919411ad6b6ddabfd88061a7555b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6ff00efb56e1358cc67995d20e4e1edfffeb0789812a5cd830e2f477e16f63f0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7018985aa093121c146c37bf15499c6914c370d8b1e61fe98047260a3f0f5d8e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7b28b5b2ffa7298e1bc65ee1f5e49125dd2ae16da86952d43e4d1ac1e04c6e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
93bee57b7167fba61070c22f0c719ebb27499c5ff106633260f340e4917cf741.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a22d19b8f183bcd64a7c85a1e82f19e6db501a7e19b93ebc313864c2a0e6ce9a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f935568ec008833a6b510aaa18da8f703b0263d31ec0ee4a4442facb817a946c.exe
Resource
win10v2004-20240226-en
General
-
Target
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
-
Size
818KB
-
MD5
7967bbff3e07fba124d8dea54e35eb77
-
SHA1
ddc12b8277caecdd80f5b01d69b1ab7b0c2e47da
-
SHA256
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5
-
SHA512
fb2db1d102f8fd17ebe1e0e49ac195a671b3222529436d177d5561bc843357106e863a190e9b06052bc6c4493ca045226aa5c9cb0d2d552a6c1edd82b6ff555a
-
SSDEEP
24576:jyD5iE2i4/+TVlB7ISI6Ajq4VCSeJ2j2ab1A:21ID/onBmVLj28
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 2 IoCs
resource yara_rule behavioral19/memory/1344-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral19/memory/1344-22-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral19/files/0x0007000000023569-24.dat family_redline behavioral19/memory/888-26-0x0000000000A50000-0x0000000000A8E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 968 lZ7Ij1rd.exe 2792 cu3Qy3qw.exe 4928 1UZ83nq3.exe 888 2SI637GC.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" lZ7Ij1rd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" cu3Qy3qw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4928 set thread context of 1344 4928 1UZ83nq3.exe 107 -
Program crash 1 IoCs
pid pid_target Process procid_target 3316 4928 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4492 wrote to memory of 968 4492 db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe 90 PID 4492 wrote to memory of 968 4492 db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe 90 PID 4492 wrote to memory of 968 4492 db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe 90 PID 968 wrote to memory of 2792 968 lZ7Ij1rd.exe 91 PID 968 wrote to memory of 2792 968 lZ7Ij1rd.exe 91 PID 968 wrote to memory of 2792 968 lZ7Ij1rd.exe 91 PID 2792 wrote to memory of 4928 2792 cu3Qy3qw.exe 92 PID 2792 wrote to memory of 4928 2792 cu3Qy3qw.exe 92 PID 2792 wrote to memory of 4928 2792 cu3Qy3qw.exe 92 PID 4928 wrote to memory of 2368 4928 1UZ83nq3.exe 106 PID 4928 wrote to memory of 2368 4928 1UZ83nq3.exe 106 PID 4928 wrote to memory of 2368 4928 1UZ83nq3.exe 106 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 4928 wrote to memory of 1344 4928 1UZ83nq3.exe 107 PID 2792 wrote to memory of 888 2792 cu3Qy3qw.exe 111 PID 2792 wrote to memory of 888 2792 cu3Qy3qw.exe 111 PID 2792 wrote to memory of 888 2792 cu3Qy3qw.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe"C:\Users\Admin\AppData\Local\Temp\db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lZ7Ij1rd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lZ7Ij1rd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cu3Qy3qw.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cu3Qy3qw.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1UZ83nq3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1UZ83nq3.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 5885⤵
- Program crash
PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2SI637GC.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2SI637GC.exe4⤵
- Executes dropped EXE
PID:888
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4444,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=3452 /prefetch:81⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4928 -ip 49281⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
583KB
MD53cb8ab596c2f49decc3c80e0809b5bfb
SHA16dfdc50e8dbd6b1d393a9d9a22b8d43d8309decf
SHA2565ec3536683e22c7ac0f4b87f8eeb050c839dde046f1b848120e1bea9e5d772c2
SHA512a5692534273c605f121083e7583e046fd56ca1a1d59b7cafba90d1fbac8bcd3b3996a8c5e20edbde725b180f18775f471b6b376d30a5afa66ff98b58cee92c6f
-
Filesize
383KB
MD593833fe8aab95b2c03057b727f4cf1e4
SHA1035778f8574072c91b0f24e884b81fb04307d267
SHA25626c470a8b0d923529cb630dee55e87b901f38e0ee675c3213b68e8b1db239e9a
SHA512df64baedc559146652d0463b8164f0c546c8c6ada13b66b1e5adc47a5391d6b1894d46ad3563e839072144296786c90b1658686058207646f779a563afddfb52
-
Filesize
298KB
MD54537b33120339c8cd45fdfaca6e2ba28
SHA1d8e3aa200f29478769eb9ba985e62755c2c2ddf2
SHA256f204bf582b6fcf0e28397ba3e40ba16eb2af1756d20ae2caf1e64b3c1870ece8
SHA512337dd140c442ca3bf34d071a7ff454cee5340ad5ea85cdff1e27678a89b98c0a0ff4a4bfe7296a2766decf4de0bb4ca1cce76503c05a1b0e1a31d7a8b8f2eb1c
-
Filesize
222KB
MD56fa7339f30118f8861b9c0e60bc7680e
SHA1379f2426b2f25c401783a13fcf245cefdd8f7b6d
SHA256dd4dd74c6f607744352dbafccf31ee23126ad9dbf8eebbc91c7847cb5368910b
SHA512a907dd11a640e9a8a1c671b7c963c09f138b14c8c0d13374ca3a09a3a9960356a4183a33ae5f18cc56037556637873bfdf8c2e5080adfe0edc126e40c86c192a