Overview
overview
10Static
static
300081e34e8...ea.exe
windows10-2004-x64
1003c5b52913...29.exe
windows10-2004-x64
10119de5a5cb...31.exe
windows10-2004-x64
101d1b24f346...2d.exe
windows10-2004-x64
103a50f05cf8...e5.exe
windows10-2004-x64
1047e26a3424...26.exe
windows10-2004-x64
105cb2e3146e...38.exe
windows10-2004-x64
75f31ea5f4e...b6.exe
windows10-2004-x64
10691f866dcf...9a.exe
windows10-2004-x64
1069d4397e3b...21.exe
windows10-2004-x64
10793977371c...71.exe
windows10-2004-x64
10823d46bb20...3e.exe
windows10-2004-x64
1089cc8588fd...62.exe
windows10-2004-x64
1098c86667f1...3f.exe
windows10-2004-x64
109f2ebdaf30...d3.exe
windows10-2004-x64
10ad2c12e934...be.exe
windows10-2004-x64
10c07f7b11ef...de.exe
windows10-2004-x64
10c2b3007441...41.exe
windows10-2004-x64
10c2c2bc25ff...d6.exe
windows7-x64
10c2c2bc25ff...d6.exe
windows10-2004-x64
10c8ec968939...44.exe
windows10-2004-x64
10cfdd198480...c6.exe
windows10-2004-x64
10e74ebb8467...40.exe
windows10-2004-x64
10e7cf07de33...a0.exe
windows10-2004-x64
10e8089d2898...9f.exe
windows10-2004-x64
10f298002951...fc.exe
windows7-x64
10f298002951...fc.exe
windows10-2004-x64
10f9420469aa...4f.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
00081e34e876bca12f70718201cced140ead03a90881cda32a50f9f68a256cea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
03c5b52913f2d935873e6576fc8246512a2381daa2ae332880d218afe379df29.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
119de5a5cbeeed307dc04cbf5ded4da088737541cdaebdb15683088ea4151d31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1d1b24f346602e2379272d189cb2e6e1b03f832a0f4cef4aa550aeda03407c2d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
3a50f05cf835b0751cd1bf42e4980ad9f9e3c83a3629331a0cdf1ed1240874e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
47e26a3424119bb3474243a62c68d0c38747b303822e8e6d0198c8fc44796126.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
5cb2e3146ea3274b3f079e836685e2606cf1e33338f3d1adfe019657232fa638.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
5f31ea5f4eff3ab14ef031f762f9d4bbea7989361e08a9f023d0687a4139f8b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
691f866dcf8672a185591df3654e1023bf55156531bb957ebf2d01b38adccd9a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
69d4397e3b55b04c8e1679751f0367e5ee1956dca9f17aa05804b89140026921.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
793977371c7b2f0c227ab38879d056d2d4121073f5f9a8204a60ac2f3238a471.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
823d46bb2009cf2d0669fdc864873d4184fbb02cc2836de9d352750179eec13e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
89cc8588fdd283d65796d258d20da78cc3e96dda70483c000ab1ff1232fa5562.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
98c86667f1ebf054c7f37dbaadbc5346fa4eb658c90ca2b27f18fc9a73e1e23f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
9f2ebdaf308ea075223c735a2bda214b336c9e5b85e7eea51d6f701c535414d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
ad2c12e934ce4a8c4fdd4abf52a21352a8456bc150312c8642d1528f0b44ebbe.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c07f7b11efb87573ed231edeeb982fc58c253f72387321ec3736463e6ea4a7de.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
c2b30074415b46d19f46cfb5af14cc647a982661dec4c01c99d01c052a77bc41.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
c2c2bc25ff713469ab99ce4873da4568ff91920dd5f18365b0bccc99f89f52d6.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
c2c2bc25ff713469ab99ce4873da4568ff91920dd5f18365b0bccc99f89f52d6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
c8ec96893956dfddde7afe6387866ad1e9246e552dd28a3b5af097fc3b5ced44.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
cfdd1984803e69136f3df9a29df5f12b0e779369443871fd786a34fa68317ec6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
e74ebb8467d5d586d2a4f3c223c158072e53cabf7285466f9a7ad66a30412d40.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
e7cf07de33635cc163ae13ce8b8adfe9ec1289ef2a77d4635c1b02bd7bd80aa0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
e8089d289872dff0d032ef9544f3019d0bb5fcff11996290619e1de6d78c7c9f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
f298002951f275351953751a44b736ad2cdb679a2cd29bda1f4f65facb4944fc.exe
Resource
win7-20240508-en
Behavioral task
behavioral27
Sample
f298002951f275351953751a44b736ad2cdb679a2cd29bda1f4f65facb4944fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe
Resource
win10v2004-20240508-en
General
-
Target
f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe
-
Size
1.0MB
-
MD5
8219c91ff157d34ad13e9eaaca1ff3d0
-
SHA1
1ef89eb62e086d504b80795557ac9e42686a9d28
-
SHA256
f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f
-
SHA512
d01862cedd90ade8eb621e73e2bbc1eeb7a937b0c7f7d288422f32a83afcf8ba832b6554aefb8aee40d43597cd8721750c470e1d59926f7bb03d7539a416caf1
-
SSDEEP
24576:Cy6yVCA/5fXKw6PEZ9jSvWMLsfUAUgcsbb/ZYGtrSmzFgiHa:p6yfBfXKVPEfSv22Ps+s7z2i
Malware Config
Extracted
redline
grome
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral28/memory/4256-25-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral28/memory/4256-28-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral28/memory/4256-26-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral28/memory/4252-37-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 4708 QO4vb69.exe 3940 yo2bo38.exe 1888 1cd54Dh6.exe 3836 2OK3253.exe 2076 3uO25Af.exe 4948 4RH916LN.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" QO4vb69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" yo2bo38.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1888 set thread context of 3136 1888 1cd54Dh6.exe 86 PID 3836 set thread context of 4256 3836 2OK3253.exe 89 PID 4948 set thread context of 4252 4948 4RH916LN.exe 94 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3uO25Af.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3uO25Af.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3uO25Af.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3136 AppLaunch.exe 3136 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3136 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4708 2420 f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe 82 PID 2420 wrote to memory of 4708 2420 f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe 82 PID 2420 wrote to memory of 4708 2420 f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe 82 PID 4708 wrote to memory of 3940 4708 QO4vb69.exe 83 PID 4708 wrote to memory of 3940 4708 QO4vb69.exe 83 PID 4708 wrote to memory of 3940 4708 QO4vb69.exe 83 PID 3940 wrote to memory of 1888 3940 yo2bo38.exe 84 PID 3940 wrote to memory of 1888 3940 yo2bo38.exe 84 PID 3940 wrote to memory of 1888 3940 yo2bo38.exe 84 PID 1888 wrote to memory of 4884 1888 1cd54Dh6.exe 85 PID 1888 wrote to memory of 4884 1888 1cd54Dh6.exe 85 PID 1888 wrote to memory of 4884 1888 1cd54Dh6.exe 85 PID 1888 wrote to memory of 3136 1888 1cd54Dh6.exe 86 PID 1888 wrote to memory of 3136 1888 1cd54Dh6.exe 86 PID 1888 wrote to memory of 3136 1888 1cd54Dh6.exe 86 PID 1888 wrote to memory of 3136 1888 1cd54Dh6.exe 86 PID 1888 wrote to memory of 3136 1888 1cd54Dh6.exe 86 PID 1888 wrote to memory of 3136 1888 1cd54Dh6.exe 86 PID 1888 wrote to memory of 3136 1888 1cd54Dh6.exe 86 PID 1888 wrote to memory of 3136 1888 1cd54Dh6.exe 86 PID 3940 wrote to memory of 3836 3940 yo2bo38.exe 87 PID 3940 wrote to memory of 3836 3940 yo2bo38.exe 87 PID 3940 wrote to memory of 3836 3940 yo2bo38.exe 87 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 3836 wrote to memory of 4256 3836 2OK3253.exe 89 PID 4708 wrote to memory of 2076 4708 QO4vb69.exe 90 PID 4708 wrote to memory of 2076 4708 QO4vb69.exe 90 PID 4708 wrote to memory of 2076 4708 QO4vb69.exe 90 PID 2420 wrote to memory of 4948 2420 f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe 92 PID 2420 wrote to memory of 4948 2420 f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe 92 PID 2420 wrote to memory of 4948 2420 f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe 92 PID 4948 wrote to memory of 4252 4948 4RH916LN.exe 94 PID 4948 wrote to memory of 4252 4948 4RH916LN.exe 94 PID 4948 wrote to memory of 4252 4948 4RH916LN.exe 94 PID 4948 wrote to memory of 4252 4948 4RH916LN.exe 94 PID 4948 wrote to memory of 4252 4948 4RH916LN.exe 94 PID 4948 wrote to memory of 4252 4948 4RH916LN.exe 94 PID 4948 wrote to memory of 4252 4948 4RH916LN.exe 94 PID 4948 wrote to memory of 4252 4948 4RH916LN.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe"C:\Users\Admin\AppData\Local\Temp\f9420469aa3326f8f0142d01cbe53363a015e3579644b84fcce388b71edb614f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QO4vb69.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QO4vb69.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yo2bo38.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yo2bo38.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1cd54Dh6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1cd54Dh6.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2OK3253.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2OK3253.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3uO25Af.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3uO25Af.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4RH916LN.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4RH916LN.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4252
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5285fa61da44042a76502bdaf177bfdc3
SHA1633c6a7d280526ce15fc4b3cc592d23b3f0b9369
SHA256518d5eb779e2a1b222e4c73ddee1d1fc11f084b7e4a86c89cd5c7527588440c0
SHA5120e5104787d42c631f406bd0f8f1a514ea20deb3b82fa3ba17c53e18b7bdfaa873085eb71ea4154ba0e42d6bab974e2671b5befc63d8bbb56a511b0d9900350e7
-
Filesize
649KB
MD5b026152757756ac3658155420556791e
SHA1ab377b5c0fba225ce59f5167b4a9afc1425f2ab5
SHA2562b692d9f64d5f9addafddb0daac9e57132a2d0a1374eaabe3c4190055f569092
SHA5126ccab4c67b217accc645ff3065f2dc6b004c9d0b8dbe251e54ececf21c99d20341605afdf2c3dfaacb77ac3a30624dc8247829419f7d3229a1cf508f6998371e
-
Filesize
31KB
MD51b1ed2b600574a71547a0083548c700f
SHA1ff3db11401b1c4d5b5cae6a324ca389e5f8b4759
SHA2561e3a92e82f55f3b4b64751d07f43cf680b1581d6378a582fc58661a46c0aa1ac
SHA512ab83ae4f1a85887c252dd488725c7b7acc4b57d380963ade7706fcf09ed17081b44fece8670ab33ef1d27fb895effcbea90da57a2ee13f9a7dd4b483f037f4cf
-
Filesize
524KB
MD5ee03c76fafa1cb23016c46da39946c86
SHA11e05b2852217613d068e1020935675f3b2accbc9
SHA256f2817b700b78788fba27a54934f8a1b51bf26cb256f9394ce7cd4a7ce3b81bf0
SHA512c7c5254d1b01714c5582b1239cd0a2ab4cfd5fe01915a807f341f92515d108b8891b35e0eaaf368853327a3e842b7ebbe147c9c1a7034e803855c18db826d568
-
Filesize
869KB
MD5aa0738466cdc5ed137b0d11b7dba6c2c
SHA11de62c97e5c6d871febd5e5d1a14acbacca0535d
SHA2560d48ce616f40f1e405cfabc0ad7f363b7e950a7085b5e81520ba25d8e81530c5
SHA512349d0c13ef9fb7eadaf63f5bb09e8956745506d4badfd731ae81c4ced4cbfc6f7ec2c504b42eb4c131b6926eb2d6279bcfd96e4cfb01a7d51c86db97de052784
-
Filesize
1.0MB
MD537bc46e7c2dccba4f672787f18871529
SHA17e17d2ccc3bf3fea74ba523bb63b763200c41ebe
SHA2560c012cf84f2a566233834482aee726755afe7f058afb09fd87f9c8b9390c7e1d
SHA51256dfe64e3e684552eeeebeaeb7185cfa076bb5b570fdc5fdf0970a1930226f207190403393d1e3137beb1f92cdc89534c9be80fe55b25523c0968545ca50e230