Analysis
-
max time kernel
113s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe
Resource
win10v2004-20241007-en
General
-
Target
b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe
-
Size
1.3MB
-
MD5
ddd0ccccdae6c3029264f6c8c590f740
-
SHA1
d571de3c5685afecccadb4b986396c2b71d0319b
-
SHA256
b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2
-
SHA512
266c1de909a8e31075c81fdb0438b8a323a22ffb81f770a7828b4d7389be51c3ebb79f94490c697f69f2b807ccf947ffc2bf1dcb869a6913725fbdfc8ac43ae5
-
SSDEEP
24576:uy/HWQpuiWicr7jYdiLnpaT263Xh+d1XrflaXYF229a0VAvvnVzEupkq5Bc:9/HppuiajU+M3kfjl59a0VMaupk
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral1/memory/1644-25-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1644-26-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1644-28-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3668-36-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Executes dropped EXE 6 IoCs
pid Process 2364 up2UZ30.exe 4996 EP7cZ99.exe 2816 1Gc65HI3.exe 3144 2PL3146.exe 3312 3Kf44Na.exe 2348 4TF620Ks.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" up2UZ30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" EP7cZ99.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2816 set thread context of 3640 2816 1Gc65HI3.exe 89 PID 3144 set thread context of 1644 3144 2PL3146.exe 98 PID 3312 set thread context of 1168 3312 3Kf44Na.exe 106 PID 2348 set thread context of 3668 2348 4TF620Ks.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 3476 2816 WerFault.exe 88 4932 3144 WerFault.exe 96 3016 3312 WerFault.exe 103 1116 2348 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language up2UZ30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EP7cZ99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Gc65HI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2PL3146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Kf44Na.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4TF620Ks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 AppLaunch.exe 3640 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3640 AppLaunch.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 4788 wrote to memory of 2364 4788 b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe 86 PID 4788 wrote to memory of 2364 4788 b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe 86 PID 4788 wrote to memory of 2364 4788 b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe 86 PID 2364 wrote to memory of 4996 2364 up2UZ30.exe 87 PID 2364 wrote to memory of 4996 2364 up2UZ30.exe 87 PID 2364 wrote to memory of 4996 2364 up2UZ30.exe 87 PID 4996 wrote to memory of 2816 4996 EP7cZ99.exe 88 PID 4996 wrote to memory of 2816 4996 EP7cZ99.exe 88 PID 4996 wrote to memory of 2816 4996 EP7cZ99.exe 88 PID 2816 wrote to memory of 3640 2816 1Gc65HI3.exe 89 PID 2816 wrote to memory of 3640 2816 1Gc65HI3.exe 89 PID 2816 wrote to memory of 3640 2816 1Gc65HI3.exe 89 PID 2816 wrote to memory of 3640 2816 1Gc65HI3.exe 89 PID 2816 wrote to memory of 3640 2816 1Gc65HI3.exe 89 PID 2816 wrote to memory of 3640 2816 1Gc65HI3.exe 89 PID 2816 wrote to memory of 3640 2816 1Gc65HI3.exe 89 PID 2816 wrote to memory of 3640 2816 1Gc65HI3.exe 89 PID 4996 wrote to memory of 3144 4996 EP7cZ99.exe 96 PID 4996 wrote to memory of 3144 4996 EP7cZ99.exe 96 PID 4996 wrote to memory of 3144 4996 EP7cZ99.exe 96 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 3144 wrote to memory of 1644 3144 2PL3146.exe 98 PID 2364 wrote to memory of 3312 2364 up2UZ30.exe 103 PID 2364 wrote to memory of 3312 2364 up2UZ30.exe 103 PID 2364 wrote to memory of 3312 2364 up2UZ30.exe 103 PID 3312 wrote to memory of 3712 3312 3Kf44Na.exe 105 PID 3312 wrote to memory of 3712 3312 3Kf44Na.exe 105 PID 3312 wrote to memory of 3712 3312 3Kf44Na.exe 105 PID 3312 wrote to memory of 1168 3312 3Kf44Na.exe 106 PID 3312 wrote to memory of 1168 3312 3Kf44Na.exe 106 PID 3312 wrote to memory of 1168 3312 3Kf44Na.exe 106 PID 3312 wrote to memory of 1168 3312 3Kf44Na.exe 106 PID 3312 wrote to memory of 1168 3312 3Kf44Na.exe 106 PID 3312 wrote to memory of 1168 3312 3Kf44Na.exe 106 PID 4788 wrote to memory of 2348 4788 b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe 109 PID 4788 wrote to memory of 2348 4788 b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe 109 PID 4788 wrote to memory of 2348 4788 b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe 109 PID 2348 wrote to memory of 3668 2348 4TF620Ks.exe 114 PID 2348 wrote to memory of 3668 2348 4TF620Ks.exe 114 PID 2348 wrote to memory of 3668 2348 4TF620Ks.exe 114 PID 2348 wrote to memory of 3668 2348 4TF620Ks.exe 114 PID 2348 wrote to memory of 3668 2348 4TF620Ks.exe 114 PID 2348 wrote to memory of 3668 2348 4TF620Ks.exe 114 PID 2348 wrote to memory of 3668 2348 4TF620Ks.exe 114 PID 2348 wrote to memory of 3668 2348 4TF620Ks.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe"C:\Users\Admin\AppData\Local\Temp\b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\up2UZ30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\up2UZ30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EP7cZ99.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EP7cZ99.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Gc65HI3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Gc65HI3.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 5685⤵
- Program crash
PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2PL3146.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2PL3146.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 5805⤵
- Program crash
PID:4932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Kf44Na.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Kf44Na.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 1484⤵
- Program crash
PID:3016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4TF620Ks.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4TF620Ks.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 5803⤵
- Program crash
PID:1116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2816 -ip 28161⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3144 -ip 31441⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3312 -ip 33121⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2348 -ip 23481⤵PID:2580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5579255224820802a8531dbdfe6f7f618
SHA19ac0461a86686b2b98646bcc5fec3256bd3ba73e
SHA2565bc9972d9cc6e8cfb46d98ee998906210d488327ff8f24fe2227b76bd5b59a7d
SHA512c6c8452ff48ba14475a25593174d5923be02f35325a55c7cce4488a3caaebe03c189ec17dda54648d0c95c77e5a0d36b81d2545b17b01c69e2b351dce86cf7b3
-
Filesize
895KB
MD5f5e93c1ac89e521eec87f144f5946d57
SHA1e23908776409f0b50e10b3f09babf198e8988197
SHA256c5a94f457b0082eb8dff8d94b308474a26e95ce1db67bb9b5eac2c366fc08c8a
SHA5122e6134059de3089db434d6372e43e8f777f52a066c0cc7a66842e831aef52c77373a0782a153ac1647c34e70d566e5674b0d7863ffcfc7547c17b9391b880463
-
Filesize
896KB
MD54a75f6b62fac70d458bb1679a1c28697
SHA1cde68b75a06e61cb78a90a33f78316ba91f83187
SHA256404658a157c066c18e637937cb2616d9e510e9024860262c5262cbda3858e32a
SHA5125b32eebc250af86ba5c7a611201f74c486ccc14e8851357aa13ef6c28f418d14745f058c65eea6199e694b639a9aa247e4703e3382da0a12cbeef8e8ac678d90
-
Filesize
533KB
MD5c513b0c6007996e0ee351b141428fe2d
SHA17e538a2fa27b3468e6c1c72aa45ff7176c23b6f9
SHA256490c5f313e1a306f1c928f1ab04d5a9839e1c5f81baff323efc7f616ed931609
SHA512f5338a1162b0db2f91cce89939eb04976fee1854428dbdacf268e34932cb28b9b8b0e711b5341b552fd5674a4fd8cc6905d65969da71a726d11e347608d61f50
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD50171fe2a193bdf62e04910480c041a0e
SHA1738cb032f1eeb7d3b07f85a640a40cb9a92bbd18
SHA256bbb103b6067c8aaeb2526d5c1753564727f8e922c7e8569a09fe71174f7713b6
SHA5124dd93f4d03a56a4875421fdc6a5769d84e63bc5c775f27ca5d062ef7fd9120d0af5eb54a78a1b8b0ad50ba9508a4c09db66f97b76a7b3ec0be35aceed7675983