Analysis
-
max time kernel
107s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
728d52c83aca0cb5de26056ec75dd870N.exe
Resource
win10v2004-20240802-en
General
-
Target
728d52c83aca0cb5de26056ec75dd870N.exe
-
Size
1.4MB
-
MD5
728d52c83aca0cb5de26056ec75dd870
-
SHA1
affc0728335f530fcac7f1b8dff3919cd1ec827a
-
SHA256
73b2c0167abf80d5aad9557dd5cc4d450d392f6a49980aa7346ec037f66ac075
-
SHA512
bf1201a598ab45ef14ef2b33d09d1fd4521d999ce179d0ae2965d4c1d7f55f61814eb4dc5d10ef47c5919c4ec0e51378264f7eda2a3c13b545449a2bea526e6a
-
SSDEEP
24576:wytD5/pwQvlVQnE2Bm2wCHv6fJ1+7IHp5WTyUDYaIxJuEn:37hwQNEvm2wovuJoIHp8Tya1Ixd
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/220-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/220-26-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/220-23-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/220-22-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000234b6-27.dat family_redline behavioral1/memory/3448-29-0x0000000000EC0000-0x0000000000EFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3860 mu5oM2kM.exe 2316 Fz1Gt3zx.exe 544 1lA45Qu0.exe 3448 2yX505hX.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 728d52c83aca0cb5de26056ec75dd870N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" mu5oM2kM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Fz1Gt3zx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 544 set thread context of 220 544 1lA45Qu0.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fz1Gt3zx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lA45Qu0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2yX505hX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 728d52c83aca0cb5de26056ec75dd870N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mu5oM2kM.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 232 wrote to memory of 3860 232 728d52c83aca0cb5de26056ec75dd870N.exe 84 PID 232 wrote to memory of 3860 232 728d52c83aca0cb5de26056ec75dd870N.exe 84 PID 232 wrote to memory of 3860 232 728d52c83aca0cb5de26056ec75dd870N.exe 84 PID 3860 wrote to memory of 2316 3860 mu5oM2kM.exe 85 PID 3860 wrote to memory of 2316 3860 mu5oM2kM.exe 85 PID 3860 wrote to memory of 2316 3860 mu5oM2kM.exe 85 PID 2316 wrote to memory of 544 2316 Fz1Gt3zx.exe 86 PID 2316 wrote to memory of 544 2316 Fz1Gt3zx.exe 86 PID 2316 wrote to memory of 544 2316 Fz1Gt3zx.exe 86 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 544 wrote to memory of 220 544 1lA45Qu0.exe 90 PID 2316 wrote to memory of 3448 2316 Fz1Gt3zx.exe 91 PID 2316 wrote to memory of 3448 2316 Fz1Gt3zx.exe 91 PID 2316 wrote to memory of 3448 2316 Fz1Gt3zx.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\728d52c83aca0cb5de26056ec75dd870N.exe"C:\Users\Admin\AppData\Local\Temp\728d52c83aca0cb5de26056ec75dd870N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mu5oM2kM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mu5oM2kM.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fz1Gt3zx.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fz1Gt3zx.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1lA45Qu0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1lA45Qu0.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2yX505hX.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2yX505hX.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3448
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
871KB
MD578bef4b2b297fa68600cec5608857ff9
SHA10e6d288faa1ff61e291c916bd733283141713480
SHA2560c803b583a467580f6d725153b9f070346b900e00fa982f66ad2f92436d1545c
SHA512f492fa4ba2ec6d667a1ace2676fb483fb19f9b00855ded6ea0423eee8022046e9593827e0ea8f57d16672c4f014ae322e82d22ef9c04cc07555af7ee93b740e6
-
Filesize
675KB
MD576ebac37b2cbd250b2a2092853786663
SHA1ebc064c3988db74312a03a82d42b0241326ff920
SHA256014a0079c64444c90312255cc5cb8a369c3c2bda22b112243084f140860472b6
SHA51214d49280beba130b39149c526549ae2bbe9ff34eaa169bf4b4678b786a19ebac27e5f5a8e05968a42a824dfc6800b8323f4a54f9e4c6df3f8376276e6b63e3b8
-
Filesize
1.8MB
MD529ea8a3ca0de717dec6202e8ecc9e779
SHA1b6ec887ce34eba44e99dfce8135e828b18695dd3
SHA25601be9b47be1486221b8d371a79e103cafcbb4514cb3225cb3681def715650b8c
SHA512e7c431f45aeb75aa4dfe6ee4e1e567ff2134f270773f458d2c6c695fb3039111d1203a6bfb66eef8e5e87e357c862597fb6d584d3c8e049555122670c43de6df
-
Filesize
221KB
MD53da0d451b69de9872e2b71bc4cffd1ec
SHA161f723ac0759e4ea69b583699865f8ac8ef5c305
SHA256273c31ed6f3826020b0f565b67994109a55773252757944b5d812899b0e16ddd
SHA5128a82f4724902bd3f59c210b4bda5018a3339cc980c52bb4c76ca2c580517349001039e3a9af6ebf0ba12bc4cf2a76df5e2d07f78ede8e84a3c9ba3786103ada4