Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2023, 15:19

General

  • Target

    668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe

  • Size

    1.6MB

  • MD5

    74f87d0cef91031be3d22ad3b0f7242f

  • SHA1

    5638f213af3d2bc50c5fcc914b04aa545da38259

  • SHA256

    668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf

  • SHA512

    e55608458fc1c71609c76cd53fd8cce06587174b41fe8ccbf3ed772c88940f0fc9abc2571cf6385dd4d112f335f79eda59d319972f172dadf974d1919dcf77ef

  • SSDEEP

    49152:59ce1L7Co15rhDyLtU4ONFvz+3tmWEZKj:H77rrpyZa63tmWEA

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe
    "C:\Users\Admin\AppData\Local\Temp\668b58991b329df844942e61f6938418cf5826cd29d60772daf39bdedfd526bf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Po3MW5Ho.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Po3MW5Ho.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oX0AZ0hG.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oX0AZ0hG.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve6Wo0yB.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve6Wo0yB.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4488
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\AQ3Yv8ep.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\AQ3Yv8ep.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1732
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gt36KH9.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gt36KH9.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:804
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:3628
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 552
                    8⤵
                    • Program crash
                    PID:4676
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 576
                  7⤵
                  • Program crash
                  PID:2688
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2zT123Pk.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2zT123Pk.exe
                6⤵
                • Executes dropped EXE
                PID:4028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3628 -ip 3628
      1⤵
        PID:2344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 804 -ip 804
        1⤵
          PID:2292

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Po3MW5Ho.exe

          Filesize

          1.5MB

          MD5

          004b7c6410bead1b880dc286a33b3314

          SHA1

          3e0f2f8ade9abed5951323764bfcabbc6e118565

          SHA256

          0087093be35054c15a366c01e76379117999a492126596d7efb649c22a09249c

          SHA512

          63ca6c35a8ff925f09e515c197cce8fe5d7b33db2f88215756ef9376d20f0a320a3e040a0ddf9f9d5f6b7eb7c1f42f4563366a0553ded67c523f249297a61740

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Po3MW5Ho.exe

          Filesize

          1.5MB

          MD5

          004b7c6410bead1b880dc286a33b3314

          SHA1

          3e0f2f8ade9abed5951323764bfcabbc6e118565

          SHA256

          0087093be35054c15a366c01e76379117999a492126596d7efb649c22a09249c

          SHA512

          63ca6c35a8ff925f09e515c197cce8fe5d7b33db2f88215756ef9376d20f0a320a3e040a0ddf9f9d5f6b7eb7c1f42f4563366a0553ded67c523f249297a61740

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oX0AZ0hG.exe

          Filesize

          1.3MB

          MD5

          635c9691e139956f994a7dc70fa53201

          SHA1

          a214b2cf6b5816f0f2edd42426b0cc5c4e1c61ca

          SHA256

          b65a24e1c6fca41490982ddbe4cc11642863f6d723d643e1e68432858bd8bf8c

          SHA512

          4c45b2f3605f8796c78af7e25763501890a1c26e0801a8ea67dcc898d02c06adca32fa9927f8f0d9fb717145b43bccbcb6e9d4a64d185fdceb1cc1bb9fa30230

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oX0AZ0hG.exe

          Filesize

          1.3MB

          MD5

          635c9691e139956f994a7dc70fa53201

          SHA1

          a214b2cf6b5816f0f2edd42426b0cc5c4e1c61ca

          SHA256

          b65a24e1c6fca41490982ddbe4cc11642863f6d723d643e1e68432858bd8bf8c

          SHA512

          4c45b2f3605f8796c78af7e25763501890a1c26e0801a8ea67dcc898d02c06adca32fa9927f8f0d9fb717145b43bccbcb6e9d4a64d185fdceb1cc1bb9fa30230

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve6Wo0yB.exe

          Filesize

          823KB

          MD5

          edcd04265e3a41c189e2878d20b0b78e

          SHA1

          8c6979e0cc6376f38a307d6c0dc7eefb4122910c

          SHA256

          7fd3f95c046b4394711e11f3519d507d0abb3329caf7901d0178641ec093ffc0

          SHA512

          faa65c91c2e45ee24df873442df7f0fef7e09f012d216d527a32c80cc6db078e8815ddd205987561120f56076e99ed2a527e4e4ed79e0a67a9cf34d5097c3534

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ve6Wo0yB.exe

          Filesize

          823KB

          MD5

          edcd04265e3a41c189e2878d20b0b78e

          SHA1

          8c6979e0cc6376f38a307d6c0dc7eefb4122910c

          SHA256

          7fd3f95c046b4394711e11f3519d507d0abb3329caf7901d0178641ec093ffc0

          SHA512

          faa65c91c2e45ee24df873442df7f0fef7e09f012d216d527a32c80cc6db078e8815ddd205987561120f56076e99ed2a527e4e4ed79e0a67a9cf34d5097c3534

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\AQ3Yv8ep.exe

          Filesize

          651KB

          MD5

          fa1547d7715dc74b765ea685d5507c9b

          SHA1

          1e5eec8f56323ca147cb5c6179834d717ceb0f3a

          SHA256

          b0c752c77cdeae59e2b44fdea8674de1912be9c54ddacba047feb3870338f78a

          SHA512

          2fdb9b7039ae1c0732aca4348f10d13f837f495b79f398cd435f7d8fe2e2217fc867f68b770b5996c753198e6b4737392a9c659e4acae97f10908a77b590da78

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\AQ3Yv8ep.exe

          Filesize

          651KB

          MD5

          fa1547d7715dc74b765ea685d5507c9b

          SHA1

          1e5eec8f56323ca147cb5c6179834d717ceb0f3a

          SHA256

          b0c752c77cdeae59e2b44fdea8674de1912be9c54ddacba047feb3870338f78a

          SHA512

          2fdb9b7039ae1c0732aca4348f10d13f837f495b79f398cd435f7d8fe2e2217fc867f68b770b5996c753198e6b4737392a9c659e4acae97f10908a77b590da78

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gt36KH9.exe

          Filesize

          1.7MB

          MD5

          335993db77fa67b5aff1fb1be1b087be

          SHA1

          ca583aa8cd1763027f12d7cebf9d85c8674fb929

          SHA256

          015092782f7d0b4375c44ac3494a7ce4ca80404eb0de57613725e386c9cbb7ca

          SHA512

          eb6bf1a6a36bfb6f72f15cc2d31a4d3ba1606a82233e43b39df30df1079430566af0f3a05027349e8eef5324c82916d92c516509e21b5271ac5decb4089ee229

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Gt36KH9.exe

          Filesize

          1.7MB

          MD5

          335993db77fa67b5aff1fb1be1b087be

          SHA1

          ca583aa8cd1763027f12d7cebf9d85c8674fb929

          SHA256

          015092782f7d0b4375c44ac3494a7ce4ca80404eb0de57613725e386c9cbb7ca

          SHA512

          eb6bf1a6a36bfb6f72f15cc2d31a4d3ba1606a82233e43b39df30df1079430566af0f3a05027349e8eef5324c82916d92c516509e21b5271ac5decb4089ee229

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2zT123Pk.exe

          Filesize

          230KB

          MD5

          ed9ad4f23bee9e433fc8315b96a25c1e

          SHA1

          40379aa88141686f07f014dc13ef5622c3219117

          SHA256

          a50e82369b9faeba96246503ede1e4016c95a72f2c09a81cd9030bc34127e8a0

          SHA512

          f45e366f4b9ce6b834e47fcffe3c9e4b1a10761daad39efa2c5ed9288b6c69e67f857f95d889d1664ec6194699f8840e3e9e972fdfba2385f97f729df6c383f0

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2zT123Pk.exe

          Filesize

          230KB

          MD5

          ed9ad4f23bee9e433fc8315b96a25c1e

          SHA1

          40379aa88141686f07f014dc13ef5622c3219117

          SHA256

          a50e82369b9faeba96246503ede1e4016c95a72f2c09a81cd9030bc34127e8a0

          SHA512

          f45e366f4b9ce6b834e47fcffe3c9e4b1a10761daad39efa2c5ed9288b6c69e67f857f95d889d1664ec6194699f8840e3e9e972fdfba2385f97f729df6c383f0

        • memory/3628-36-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/3628-37-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/3628-39-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/3628-35-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/4028-46-0x00000000070C0000-0x0000000007152000-memory.dmp

          Filesize

          584KB

        • memory/4028-44-0x0000000074530000-0x0000000074CE0000-memory.dmp

          Filesize

          7.7MB

        • memory/4028-45-0x00000000075D0000-0x0000000007B74000-memory.dmp

          Filesize

          5.6MB

        • memory/4028-43-0x00000000002F0000-0x000000000032E000-memory.dmp

          Filesize

          248KB

        • memory/4028-47-0x00000000072A0000-0x00000000072B0000-memory.dmp

          Filesize

          64KB

        • memory/4028-48-0x0000000007260000-0x000000000726A000-memory.dmp

          Filesize

          40KB

        • memory/4028-49-0x00000000081A0000-0x00000000087B8000-memory.dmp

          Filesize

          6.1MB

        • memory/4028-50-0x0000000007B80000-0x0000000007C8A000-memory.dmp

          Filesize

          1.0MB

        • memory/4028-51-0x0000000007490000-0x00000000074A2000-memory.dmp

          Filesize

          72KB

        • memory/4028-52-0x00000000074F0000-0x000000000752C000-memory.dmp

          Filesize

          240KB

        • memory/4028-53-0x0000000007530000-0x000000000757C000-memory.dmp

          Filesize

          304KB

        • memory/4028-54-0x0000000074530000-0x0000000074CE0000-memory.dmp

          Filesize

          7.7MB

        • memory/4028-55-0x00000000072A0000-0x00000000072B0000-memory.dmp

          Filesize

          64KB