Overview
overview
10Static
static
30eb0accf09...b2.exe
windows10-2004-x64
1024941336d0...72.exe
windows10-2004-x64
1026a2cda7a1...98.exe
windows10-2004-x64
1029d3a95944...db.exe
windows10-2004-x64
102d75908c07...9b.exe
windows10-2004-x64
733aed805e1...e6.exe
windows10-2004-x64
1040d8e0aa1d...18.exe
windows10-2004-x64
748cb6f7d0b...c9.exe
windows10-2004-x64
10542eb4afaa...9a.exe
windows10-2004-x64
76f328c3e1d...2a.exe
windows10-2004-x64
1074692ca9aa...ea.exe
windows10-2004-x64
10759eb38c21...de.exe
windows10-2004-x64
10858cb57de5...0c.exe
windows10-2004-x64
109bd29cf05e...27.exe
windows10-2004-x64
10b0555f3c53...33.exe
windows10-2004-x64
7bde148bc51...21.exe
windows10-2004-x64
10c7e81c0377...b0.exe
windows7-x64
10c7e81c0377...b0.exe
windows10-2004-x64
10d0c5f5c327...0e.exe
windows10-2004-x64
10d165dd7703...70.exe
windows7-x64
10d165dd7703...70.exe
windows10-2004-x64
10d9645ca9ce...5b.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
0eb0accf09d83ec290b068c81be5e6c35e15cd72f8c10f74ea2ed429b7fcc8b2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
24941336d0128a7ae974066981d3a1f75cc9af91a69a49b292688943f69afa72.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
26a2cda7a1e823b15014df6457ead29cc24ca1e9d7348e5f7ce65fac3e640998.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
29d3a95944732180e7b649fa96bb2f15636a9658a83828117964eea5a39c72db.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d75908c0774dcb3f45e676b4c83554e0c2c94a1e96fd64e163484e0dbbf359b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33aed805e114f04f73f867fdb7cf904e15447aa47f74e094c024c9b18c217fe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
40d8e0aa1d01acecacb5b454de82773c5a4b5f13ec3abf8ee0ce0c906690a918.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
48cb6f7d0b36f2bddf99dded0256c01e0ed197a5ea74b14bf98bf561c0cf49c9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
542eb4afaab2b90e95d070cb150ef76e8faa23f3afdd12ab49978cbb72dd389a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6f328c3e1d2f3ad40a09cd133e1964bbc4fc21dcbb7af8520e97006992426b2a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
74692ca9aa25e702576e835faf8a87d99d208bf02a87a5cd0cca52088e2e27ea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
759eb38c21f37bb8710a051f23e7ca3b1fca3fafe197b70c2714bc36c21e87de.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
858cb57de5b9461a30d4dfd6c797315d00f9582d8210518ba989d761e6fb490c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bd29cf05e48e1f9b5f02750f58864848d24e66aab5b629f9133b674bc59b527.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b0555f3c536302c5af72051c3c2bc10649a88011e7aa16d3c661971df2866f33.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
bde148bc512eb25836030bebc3cbfd472cef53289015dbf4126dd1366b1c6421.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c7e81c037737d5a821cf236c8453b7b00607cd99d42863e39e0d703c731be6b0.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
c7e81c037737d5a821cf236c8453b7b00607cd99d42863e39e0d703c731be6b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d0c5f5c327d3c5cad19261fe1e5c8af4374da45c48236a7064c548a425e23a0e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
d165dd77039589d5d25d898e400cb1806ef4225f7b6af17c51cc83c2ec12d070.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
d165dd77039589d5d25d898e400cb1806ef4225f7b6af17c51cc83c2ec12d070.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe
Resource
win10v2004-20240426-en
General
-
Target
d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe
-
Size
1.1MB
-
MD5
d92888066793d326a49b21e7a091d25a
-
SHA1
e08eeaf2c76508e1fbced904177ad68f055d1344
-
SHA256
d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b
-
SHA512
3595c349657597fcc1e692226c9e5675486de21075b94d452e8729754aa1687489b5cf65f74d17f53b07f988072de09fe81a9db2c844e1f52342e988f6a9bce4
-
SSDEEP
24576:1yzt5x6zpWENBhJ60yaE8zyJq1h/yLj1IhU1fS8DhnGR04l2IjdeSiRA5:Qzt5xEWIbyGN1sNLhl4lDJ8R
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral22/files/0x000800000002347b-25.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral22/files/0x000700000002347c-29.dat family_redline behavioral22/memory/3456-31-0x0000000000870000-0x00000000008AE000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 3496 cA4Pt1WP.exe 1424 Tg0Qt3GZ.exe 2332 UM3vW4jG.exe 1124 1uO07FG3.exe 3456 2HF149GC.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" cA4Pt1WP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Tg0Qt3GZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" UM3vW4jG.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3496 3260 d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe 85 PID 3260 wrote to memory of 3496 3260 d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe 85 PID 3260 wrote to memory of 3496 3260 d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe 85 PID 3496 wrote to memory of 1424 3496 cA4Pt1WP.exe 86 PID 3496 wrote to memory of 1424 3496 cA4Pt1WP.exe 86 PID 3496 wrote to memory of 1424 3496 cA4Pt1WP.exe 86 PID 1424 wrote to memory of 2332 1424 Tg0Qt3GZ.exe 87 PID 1424 wrote to memory of 2332 1424 Tg0Qt3GZ.exe 87 PID 1424 wrote to memory of 2332 1424 Tg0Qt3GZ.exe 87 PID 2332 wrote to memory of 1124 2332 UM3vW4jG.exe 89 PID 2332 wrote to memory of 1124 2332 UM3vW4jG.exe 89 PID 2332 wrote to memory of 1124 2332 UM3vW4jG.exe 89 PID 2332 wrote to memory of 3456 2332 UM3vW4jG.exe 90 PID 2332 wrote to memory of 3456 2332 UM3vW4jG.exe 90 PID 2332 wrote to memory of 3456 2332 UM3vW4jG.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe"C:\Users\Admin\AppData\Local\Temp\d9645ca9ce715a28ec2e2bfb66f661e256335f09bba61c0b86d73a530dacb15b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cA4Pt1WP.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cA4Pt1WP.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Tg0Qt3GZ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Tg0Qt3GZ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\UM3vW4jG.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\UM3vW4jG.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1uO07FG3.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1uO07FG3.exe5⤵
- Executes dropped EXE
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HF149GC.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2HF149GC.exe5⤵
- Executes dropped EXE
PID:3456
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
942KB
MD5fe3b9a8b0716fa57242d40630d783156
SHA10a730328d4a3672a561d521f2b8daa9707b1dea5
SHA256a4a80eebdd22eab822a0796ae85ae68f04d6f8cd3384f77a780dcd850d30f0dd
SHA512e49094cfffbeb6b3e291c7a0b0a6da7f16eadab62b6dcf7a267baee7f657ccc28ca50c9b7eddf02874af596555bc79191f5917d5af1e7203580eacc8bf42eeb1
-
Filesize
514KB
MD56dc695291d3acffeec67ca30726db64f
SHA1d6afeae9394aadb4039c68badbbc7c2ca3cc4ff7
SHA25641a5e5e499c790600621de8fa1a3e7dab95fd60c84ebeef8bfa7c583c716b416
SHA512c689906f58647f9af16f4ed80486196d5045d92e6a0af8cc7299a17662e110aa38d4cc69a8039ddec0b4def0b8475941e00bb45754064fa7a0442027115b9bba
-
Filesize
319KB
MD50a4f7035e279f51d48c04c0fe1353ece
SHA12e4c2150c4a2989be0c4ed4d1b1bd88625aa8708
SHA256d799883d0f8457e846b9b03a5b1d907bf274b8b42554780bc63d837d95a08977
SHA512cae488fab30df92fc34f05b84d60b9cbc64a75c5e64ecf636e64a23369418161c47273addc107570781660bac869145f6664316d7e9cc3225e0892e496bcb02e
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e
-
Filesize
221KB
MD59d3ef1f0b37bef2db8b3168b6530360f
SHA13ddf1aec7eb1c6f74851f34c9f822fc27b9d770d
SHA256871a82f9478848cf7043d0fd866f7d705fed37fcf8e37ea79910120fdab3f8cd
SHA5129b564b8d146e783539ccde557f47addb8fa0488ec4471fe0189e2e87ef5c5c0b7bb12c0e38e544ace6941bd851e685fd1406f6394d2588e4f1de16ed178014d7