Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe
Resource
win10v2004-20241007-en
General
-
Target
555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe
-
Size
522KB
-
MD5
445f7f64dbdf136608359b3ac09cc3f2
-
SHA1
a6c747bd747eb775cfb07376e21283e2c44b9c8d
-
SHA256
555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1
-
SHA512
906c8127789f8e5afc6059b9ede36c037a021d5ebfdf23ba0724ca823278e86d688ff1e4a374758dd35b2bf1519397407d8537c1598f3fb927bcee9d61a83e3d
-
SSDEEP
6144:KQy+bnr+jp0yN90QEFhJRfOCrz1ensG/ZmlTjDzLc24vwpgHho8llvrgliPAtt6/:0Mrjy90PhxRTj424vw9cklV4sNLFQx9
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000023b5d-12.dat mystic_family -
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b5e-15.dat family_redline behavioral1/memory/512-18-0x0000000000510000-0x000000000054E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1824 Qb9FK5VE.exe 1340 1AK48Cq1.exe 512 2ne164fS.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Qb9FK5VE.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qb9FK5VE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1AK48Cq1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ne164fS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 708 wrote to memory of 1824 708 555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe 84 PID 708 wrote to memory of 1824 708 555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe 84 PID 708 wrote to memory of 1824 708 555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe 84 PID 1824 wrote to memory of 1340 1824 Qb9FK5VE.exe 85 PID 1824 wrote to memory of 1340 1824 Qb9FK5VE.exe 85 PID 1824 wrote to memory of 1340 1824 Qb9FK5VE.exe 85 PID 1824 wrote to memory of 512 1824 Qb9FK5VE.exe 87 PID 1824 wrote to memory of 512 1824 Qb9FK5VE.exe 87 PID 1824 wrote to memory of 512 1824 Qb9FK5VE.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe"C:\Users\Admin\AppData\Local\Temp\555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qb9FK5VE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qb9FK5VE.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1AK48Cq1.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1AK48Cq1.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ne164fS.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ne164fS.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD5788425e89453595b3cde23a4340eb9b4
SHA1e79a7acc90a8290974709f03e713dc43e7b43092
SHA2562e1a42a1f156e8abc690a56d06352aacdd8b42f70729300bf5fae62ee0b5eee3
SHA512a6b264112ab5ade6d99d498c2692793dcdb5494d88f98e8c4ffe9b2e927d04c08426d5f06e93a231880c3928675e442c2889555ce2c270e79d7852f0ad881e81
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84
-
Filesize
221KB
MD54eb67f4d64fb8297a3dc8ffc6df010bb
SHA10f79d6e2150adcd7277ce5cd822d13d8a907b0f5
SHA256f28406ecf29bdcefbd9bdfb4794385e2d073710946c952025af1c44b355816fb
SHA512bade839a420a3ca0899f67948089674e96ce7bc6e16e4a6aa2176a586b6a269623dd498c886763a22d3498af2d15111b590d2a54aef3b703a7087b7ecebbd301