Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe
Resource
win10v2004-20241007-en
General
-
Target
72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe
-
Size
1.3MB
-
MD5
716dee739a1ca6d3fbe97ca1453e4fd3
-
SHA1
bcd1490bf52296f5e41eba2038d97b93722b1568
-
SHA256
72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6
-
SHA512
24aeb94afa0a04bc3d7c622ea242ae71a64baba14eadc2f5be48d109d52989713cefed6625050a90dbc323b9f692a6fef342291aaaa65a1017ae5c412301ae56
-
SSDEEP
24576:FymFdtmpnRMDYvZGWafUEo6TDyTh4i5H9/BVwQCwiDG5D2UFOZ+70IqHk:gmFdtCRL9gUz6aV5H9/kQC05tdPa
Malware Config
Extracted
redline
trush
77.91.124.82:19071
-
auth_value
c13814867cde8193679cd0cad2d774be
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral1/memory/4504-33-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral1/memory/4504-36-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral1/memory/4504-34-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca0-26.dat healer behavioral1/memory/4748-28-0x00000000005B0000-0x00000000005BA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8875666.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a8875666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8875666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8875666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8875666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8875666.exe -
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2968-44-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Redline family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Executes dropped EXE 8 IoCs
pid Process 4084 v9079639.exe 1432 v4764778.exe 1868 v1251959.exe 4748 a8875666.exe 508 b2443589.exe 2460 c0034045.exe 444 d9552604.exe 2072 e5129063.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8875666.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9079639.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4764778.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1251959.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 508 set thread context of 4504 508 b2443589.exe 100 PID 2460 set thread context of 732 2460 c0034045.exe 107 PID 444 set thread context of 2968 444 d9552604.exe 113 -
Program crash 3 IoCs
pid pid_target Process procid_target 1708 508 WerFault.exe 98 2008 2460 WerFault.exe 105 1940 444 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9079639.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2443589.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9552604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5129063.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4764778.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1251959.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0034045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4748 a8875666.exe 4748 a8875666.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4748 a8875666.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4084 3516 72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe 86 PID 3516 wrote to memory of 4084 3516 72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe 86 PID 3516 wrote to memory of 4084 3516 72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe 86 PID 4084 wrote to memory of 1432 4084 v9079639.exe 87 PID 4084 wrote to memory of 1432 4084 v9079639.exe 87 PID 4084 wrote to memory of 1432 4084 v9079639.exe 87 PID 1432 wrote to memory of 1868 1432 v4764778.exe 88 PID 1432 wrote to memory of 1868 1432 v4764778.exe 88 PID 1432 wrote to memory of 1868 1432 v4764778.exe 88 PID 1868 wrote to memory of 4748 1868 v1251959.exe 89 PID 1868 wrote to memory of 4748 1868 v1251959.exe 89 PID 1868 wrote to memory of 508 1868 v1251959.exe 98 PID 1868 wrote to memory of 508 1868 v1251959.exe 98 PID 1868 wrote to memory of 508 1868 v1251959.exe 98 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 508 wrote to memory of 4504 508 b2443589.exe 100 PID 1432 wrote to memory of 2460 1432 v4764778.exe 105 PID 1432 wrote to memory of 2460 1432 v4764778.exe 105 PID 1432 wrote to memory of 2460 1432 v4764778.exe 105 PID 2460 wrote to memory of 732 2460 c0034045.exe 107 PID 2460 wrote to memory of 732 2460 c0034045.exe 107 PID 2460 wrote to memory of 732 2460 c0034045.exe 107 PID 2460 wrote to memory of 732 2460 c0034045.exe 107 PID 2460 wrote to memory of 732 2460 c0034045.exe 107 PID 2460 wrote to memory of 732 2460 c0034045.exe 107 PID 4084 wrote to memory of 444 4084 v9079639.exe 110 PID 4084 wrote to memory of 444 4084 v9079639.exe 110 PID 4084 wrote to memory of 444 4084 v9079639.exe 110 PID 444 wrote to memory of 4828 444 d9552604.exe 112 PID 444 wrote to memory of 4828 444 d9552604.exe 112 PID 444 wrote to memory of 4828 444 d9552604.exe 112 PID 444 wrote to memory of 2968 444 d9552604.exe 113 PID 444 wrote to memory of 2968 444 d9552604.exe 113 PID 444 wrote to memory of 2968 444 d9552604.exe 113 PID 444 wrote to memory of 2968 444 d9552604.exe 113 PID 444 wrote to memory of 2968 444 d9552604.exe 113 PID 444 wrote to memory of 2968 444 d9552604.exe 113 PID 444 wrote to memory of 2968 444 d9552604.exe 113 PID 444 wrote to memory of 2968 444 d9552604.exe 113 PID 3516 wrote to memory of 2072 3516 72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe 116 PID 3516 wrote to memory of 2072 3516 72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe 116 PID 3516 wrote to memory of 2072 3516 72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe"C:\Users\Admin\AppData\Local\Temp\72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9079639.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9079639.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4764778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4764778.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1251959.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1251959.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8875666.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8875666.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2443589.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2443589.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1486⤵
- Program crash
PID:1708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0034045.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0034045.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 1365⤵
- Program crash
PID:2008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9552604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9552604.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 5724⤵
- Program crash
PID:1940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e5129063.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e5129063.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 508 -ip 5081⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2460 -ip 24601⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 444 -ip 4441⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD57a971f85ff85be9e48a83a1650380755
SHA153c50d8055094b44b7ad3015118f1972c19c6cfb
SHA2562e42957b1a5a4a3fa84ee2edccc1efc3bfc1a47d6f842b317810a06300c5c882
SHA5122098fa43f3401f8ff8e06f844eecaf8432b92a4303cb7c4b751179ec9f8dc32bd40bf22ba2819859b0722baa8ff0d0347f4082d663484892b93041f70c319cbe
-
Filesize
1.2MB
MD5373d14fad3ecd46aea39c2b3d3fa6747
SHA114f49dd842c50174fec9bdf84e27260b0f4d35e4
SHA256e5e3b9ac8cac44248112264e031e631ab83817d682369fd13b80e7807e25ee94
SHA5126d0afffe2e78b970f19d9e43d4fc6ec3100a00fc0359323e98329e41e59324727016367da46f926da44c79cd1da4211d2164945d900e806541ea724ce7416614
-
Filesize
1.0MB
MD5dd5511562e6b91e3b9ccb2589cca88eb
SHA121408d85a32ba31d8ca92382342cc7654b7e28a4
SHA256b999015334444f22c60974d8cc3197380cc84d193173cfbf55c20785cb0e12a8
SHA512ef7e69db59c81069cf4e094ddd9d9cb225f434297bf29c138f8e6f2f5ab82f2b63e4d9e288a53f8014e5a17cb4742be733306a0858e5bdd7062c6fc90831c312
-
Filesize
835KB
MD56b8e2a0c2b915f34bda628af0d662aa5
SHA1d2878f1df083ce3134ddd900831e55cba8f56e7b
SHA256e517997ac450ef578ef7267abe25810ec7e85296bd335446e99b5f19d90e5c80
SHA5127c686c4e48bfda49ed202ae9e74f5b9315c6eeee1d39a328ea62513f024c069c647f903184e6b36feeb67bb44fb45d1e2c84d53b5a2ec86f0f1e5604ed4ed1ee
-
Filesize
884KB
MD5ae879b44eba9325f8ba979a61d0b2746
SHA15b94fe29e42850258af44af025d0d54602563bf7
SHA256e699275ecefa33670ad3d821a7294a4c73ea2154919fe9b828b92fcad759ca5b
SHA5129e163d6cabb5e84dc97927ccc6de8d730a4e9da1c38788e25bf9304d2bbed4b2c610c14cb6f08baac38f3d5a99701b19fa3ced43bbf6ca02c1a390da85e3dfab
-
Filesize
475KB
MD5695557b9ba9ab7e26f3bdddaf9f70e05
SHA1e92d86bcfd85b96cb2fe7ec8fe198591ba56f235
SHA25624af32571f5374ad69fae3db059f7c177e81f2b239bd517aa224637f145f1cbd
SHA512045b7e6fe2e839cfc5f81f9202117143bee41da0532d31554d7c58059e31975bbfe86fcee558d14cbe4e7074f4dd83cbe4ba87dd58defca173cb452aa5cefd43
-
Filesize
11KB
MD5417bf355ff406c10fd30628dc9629590
SHA12679d7839e4e361ea016e99e453b981002dc2d71
SHA2569eea16179fbb0add20846370c57fc4973b3f6726983712d8314df208527b6b9b
SHA512da8d590bb3a786087512aa99ed2e081aac67780b6b5e14a03e13dee3a2f59f23c8b21617b9ce961bfed5644626b433fbd8ceb4965a1e5e796113c1a8473bf966
-
Filesize
1.0MB
MD53559a8fca3a77b081cd96efcbbc2647c
SHA10ca328528957262bcc32e7ae3d0f46e7ed178923
SHA25605b778559a235267e3af74087f94b2e7e85e01ec189b44b80c566c2760255af6
SHA5121ef33d19dc2632ef776f03bed9312a2cae3b6214d2487003507e48516ab524ad1f2e5c9d0eacef396e043fd09ee73f6fca8057ceb07e688e9e145158231f3bea