Overview
overview
10Static
static
304a0e65087...2d.exe
windows10-2004-x64
100b23052e1d...05.exe
windows10-2004-x64
101319d83702...15.exe
windows10-2004-x64
1015bb5ac797...dd.exe
windows10-2004-x64
1019eb5c3dd8...ec.exe
windows10-2004-x64
102864919e9f...b7.exe
windows10-2004-x64
102f05412e59...2c.exe
windows10-2004-x64
103fd9e44b8d...84.exe
windows10-2004-x64
104920924329...b6.exe
windows10-2004-x64
106d6ab7a20c...33.exe
windows10-2004-x64
106e839edc16...b0.exe
windows10-2004-x64
106ff00efb56...f0.exe
windows10-2004-x64
107018985aa0...8e.exe
windows10-2004-x64
107b28b5b2ff...4e.exe
windows10-2004-x64
1093bee57b71...41.exe
windows10-2004-x64
10a22d19b8f1...9a.exe
windows10-2004-x64
10af3432152c...8d.exe
windows10-2004-x64
10bf27d39d4b...d1.exe
windows10-2004-x64
10db87d25edb...b5.exe
windows10-2004-x64
10f935568ec0...6c.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1319d8370208b00e5260cfc0b8f145575c62bd43ab6f76605a992afeb6737f15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
15bb5ac797303fa462001ce5fd88a7bfc4702cd65f0a1768f9b994f6495a49dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19eb5c3dd82e78329d1d98ef6b119402fff11484aea9cfea0e3e1135eea669ec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2864919e9fd253aa62ab37d5b02410fa89dd3ead4618da0b908d3b41e73167b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4920924329af964d29e90b0bd3763c20450919411ad6b6ddabfd88061a7555b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6ff00efb56e1358cc67995d20e4e1edfffeb0789812a5cd830e2f477e16f63f0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7018985aa093121c146c37bf15499c6914c370d8b1e61fe98047260a3f0f5d8e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7b28b5b2ffa7298e1bc65ee1f5e49125dd2ae16da86952d43e4d1ac1e04c6e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
93bee57b7167fba61070c22f0c719ebb27499c5ff106633260f340e4917cf741.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a22d19b8f183bcd64a7c85a1e82f19e6db501a7e19b93ebc313864c2a0e6ce9a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f935568ec008833a6b510aaa18da8f703b0263d31ec0ee4a4442facb817a946c.exe
Resource
win10v2004-20240226-en
General
-
Target
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
-
Size
938KB
-
MD5
e559bc5e8fecf95110c7a977c73e5bfc
-
SHA1
cf404a4cb36c334349f810fae25ca2276ecdd1cb
-
SHA256
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84
-
SHA512
510d2ddefa82c77f0c6bf1bace04ce06d2c15688dac20597ef6f964670303faa305f53e15d655392cef6f1104d455b2d752fa2f56ef0d778ecdc5ae803197f8c
-
SSDEEP
24576:lyfjhihl0dK0Ht3tVBJ0CPaKekYkV6HmL3eZ:A1i+K4ZtVBJ0oaK376HmL
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral8/memory/4600-28-0x0000000000400000-0x000000000042C000-memory.dmp mystic_family behavioral8/memory/4600-29-0x0000000000400000-0x000000000042C000-memory.dmp mystic_family behavioral8/memory/4600-31-0x0000000000400000-0x000000000042C000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5402533.exe family_redline behavioral8/memory/4852-35-0x0000000000290000-0x00000000002C0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
x3337561.exex2248185.exex6982654.exeg4840220.exeh5402533.exepid process 988 x3337561.exe 1236 x2248185.exe 2640 x6982654.exe 5052 g4840220.exe 4852 h5402533.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exex3337561.exex2248185.exex6982654.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3337561.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2248185.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6982654.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g4840220.exedescription pid process target process PID 5052 set thread context of 4600 5052 g4840220.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2428 5052 WerFault.exe g4840220.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exex3337561.exex2248185.exex6982654.exeg4840220.exedescription pid process target process PID 3580 wrote to memory of 988 3580 3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe x3337561.exe PID 3580 wrote to memory of 988 3580 3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe x3337561.exe PID 3580 wrote to memory of 988 3580 3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe x3337561.exe PID 988 wrote to memory of 1236 988 x3337561.exe x2248185.exe PID 988 wrote to memory of 1236 988 x3337561.exe x2248185.exe PID 988 wrote to memory of 1236 988 x3337561.exe x2248185.exe PID 1236 wrote to memory of 2640 1236 x2248185.exe x6982654.exe PID 1236 wrote to memory of 2640 1236 x2248185.exe x6982654.exe PID 1236 wrote to memory of 2640 1236 x2248185.exe x6982654.exe PID 2640 wrote to memory of 5052 2640 x6982654.exe g4840220.exe PID 2640 wrote to memory of 5052 2640 x6982654.exe g4840220.exe PID 2640 wrote to memory of 5052 2640 x6982654.exe g4840220.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 5052 wrote to memory of 4600 5052 g4840220.exe AppLaunch.exe PID 2640 wrote to memory of 4852 2640 x6982654.exe h5402533.exe PID 2640 wrote to memory of 4852 2640 x6982654.exe h5402533.exe PID 2640 wrote to memory of 4852 2640 x6982654.exe h5402533.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe"C:\Users\Admin\AppData\Local\Temp\3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3337561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3337561.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2248185.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2248185.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6982654.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6982654.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4840220.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4840220.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 5526⤵
- Program crash
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5402533.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5402533.exe5⤵
- Executes dropped EXE
PID:4852
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5052 -ip 50521⤵PID:644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
836KB
MD501581c32dff9ed6b4633b9293622a97e
SHA1579c4ff938b5814fec6627b2fdef2a9124cf08fe
SHA2566fa924311103425ee80592933518ad5b406ad0e867735126e6d48da44e5bc587
SHA512acba1360b7008220d7925cc20638eb49c9fe2c2304d81320dfbb0567eb5169c9d7a4849dcc4fa06bf577ff4b7386e43b39df770fb7ba881b1c7d89c48c52efc7
-
Filesize
571KB
MD50f2376add40068168ab09e19cd6dec6c
SHA10dd404487ebd2c5a042830a12bc82f8ebcd496b0
SHA256554391374624779dd9f64b5f5828342c4edbee14be957098bc34eac8fb082dca
SHA5123df6c827870b329446560cc68fe6272d72491ce0fe81dc4188d9cf8ecf5ce49a4f21d160680679ddefb3a8efcb7628a44c73b915ceece4db5d528620b753b6de
-
Filesize
394KB
MD56471272685724fde31be54e3e036e288
SHA1a777ee955bb2f3a26b6262c3dd6ca8eb57008168
SHA256a39f6531ac010fa51d77e26b0739297988c592349e2de207fead0e9deacb3c89
SHA5129150ab137a82b8fe65bc178b9cd8d11ad2633c97e3ef3020c8c84bac214909d8b467509702608ea99bac6cd2f8b7af4b8c81757341dc5918559f65518d4aea84
-
Filesize
365KB
MD5777f226b0587861e634cec1ca1fb487e
SHA1709855bcdc419a75b9a47d196a918a19130fc5a2
SHA2568d50ea48ca318b4f0c88e207085489020a87cedd6b12f16feea83af849b9f883
SHA512e11a953e32f244df6f3b7f2cba0c0d0eb1b2cca34103fbc40b33ec2ea3bbc00c2708556df2763205fb73daac910905f2263277dbaec0fb7df6fc83e58a1ffb31
-
Filesize
174KB
MD5108091504d79a522f47bdf7ae100a0d7
SHA159dfaf24682ff298d1a485413dda41cd02d23ec2
SHA256295c208946011cfeda2442e88ee1b43220d06447285e54cc95595f2fbff9d8a6
SHA512772ec1f5b7ebf2b44113084f8917cd96c6086b7f9210c96f309c822510d890766411133e47bbdbcd5c703be1f8892de844ae086f15361a5d9e8c7f3015ffa96f