Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2023, 20:29

General

  • Target

    NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe

  • Size

    1.2MB

  • MD5

    35e6d0d83c1a24d784a25f6703554fd3

  • SHA1

    f6f0c985a6f9a000fe2556deafa9c3b912d1ba20

  • SHA256

    1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5

  • SHA512

    237b1ed4159b01ad9f791bbfb3730e9b083d617c23897fb0497b36e050ecfd609d291ba0dbc5213d270d35de0a2c80dee2ef0d668deaf1d2167c16185cbceadc

  • SSDEEP

    24576:9yWk+rsN4JbSgZwfzyR9r0Tt+uFSXbiNxVhWJluxKHqVI:YWk+rsN4bS2R9KSbKjhyU1

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3476
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4412
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4444
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:1068
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 556
                    8⤵
                    • Program crash
                    PID:828
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 592
                  7⤵
                  • Program crash
                  PID:3104
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aL034bP.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aL034bP.exe
                6⤵
                • Executes dropped EXE
                PID:3420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1068 -ip 1068
      1⤵
        PID:4176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4444 -ip 4444
        1⤵
          PID:756

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe

          Filesize

          1.0MB

          MD5

          3e2f06d41b144a52aa1260e35397c477

          SHA1

          5e3dbadae95600f804aa64e1241ded7796a360b2

          SHA256

          c2515a5127ee8f97cc34d5010c9d3ed1f321e07f3299975b251556776ed58c9b

          SHA512

          e1f60bd589bf995fbc0ef866ce85873470f4350e5d6c1149058ca9508b7f16c87ba3fb53c19731ed77ea70aad60d60eafe048d862c7e8cd1bc6bb3076bd838ea

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe

          Filesize

          1.0MB

          MD5

          3e2f06d41b144a52aa1260e35397c477

          SHA1

          5e3dbadae95600f804aa64e1241ded7796a360b2

          SHA256

          c2515a5127ee8f97cc34d5010c9d3ed1f321e07f3299975b251556776ed58c9b

          SHA512

          e1f60bd589bf995fbc0ef866ce85873470f4350e5d6c1149058ca9508b7f16c87ba3fb53c19731ed77ea70aad60d60eafe048d862c7e8cd1bc6bb3076bd838ea

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe

          Filesize

          884KB

          MD5

          af694cbed9b219484d7444110f71c64e

          SHA1

          a5f2813bd3bb0bec6b30fc299b86d6a684921f28

          SHA256

          b45f5479a171613b80d9e6131c720039fe54fa34a05a693c389e39fe860d3ca8

          SHA512

          a99e9b531c8f8573c9ede6066a6aad551a3a249ade9b0ce7cbc788257865e9592d27e395408f122b9aec8a322ec093bc42f3003b4f727b28122f8f304386bc60

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe

          Filesize

          884KB

          MD5

          af694cbed9b219484d7444110f71c64e

          SHA1

          a5f2813bd3bb0bec6b30fc299b86d6a684921f28

          SHA256

          b45f5479a171613b80d9e6131c720039fe54fa34a05a693c389e39fe860d3ca8

          SHA512

          a99e9b531c8f8573c9ede6066a6aad551a3a249ade9b0ce7cbc788257865e9592d27e395408f122b9aec8a322ec093bc42f3003b4f727b28122f8f304386bc60

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe

          Filesize

          590KB

          MD5

          6f9ea81f43f481c93f4b96f40c957c0d

          SHA1

          f6c8a18315aed12e8f948d2de3a89dc039f4f9ef

          SHA256

          310eceeebc1d9d03fefd45793f82d65923a7ae9128698b16f5fe924faa6fbb82

          SHA512

          24a52bccd3bb25b839f25cd71d27fce19026035a8941dd6661bcbe842feca851530ba6a7f73e00953280292330dbfe1a95c223a38f17ec0bd99d60e068290106

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe

          Filesize

          590KB

          MD5

          6f9ea81f43f481c93f4b96f40c957c0d

          SHA1

          f6c8a18315aed12e8f948d2de3a89dc039f4f9ef

          SHA256

          310eceeebc1d9d03fefd45793f82d65923a7ae9128698b16f5fe924faa6fbb82

          SHA512

          24a52bccd3bb25b839f25cd71d27fce19026035a8941dd6661bcbe842feca851530ba6a7f73e00953280292330dbfe1a95c223a38f17ec0bd99d60e068290106

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe

          Filesize

          417KB

          MD5

          3f4d0141d4cb30cdeb4f82125b115c95

          SHA1

          5f69acfa0d749466b4158fe82158d0411e7d1be2

          SHA256

          e2b942481952a21f27b0f668ff1e3bcf121d5da3d3e2d635a37b81ccc4f9d640

          SHA512

          836c9b4c8445b75b3fad7a8c13154999adb5e15f2b59fc394390706fcd1e1936f527cc0dec5d88f07517724c45bd1f860f770866af77d3767e9f2f0b0a9ecac9

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe

          Filesize

          417KB

          MD5

          3f4d0141d4cb30cdeb4f82125b115c95

          SHA1

          5f69acfa0d749466b4158fe82158d0411e7d1be2

          SHA256

          e2b942481952a21f27b0f668ff1e3bcf121d5da3d3e2d635a37b81ccc4f9d640

          SHA512

          836c9b4c8445b75b3fad7a8c13154999adb5e15f2b59fc394390706fcd1e1936f527cc0dec5d88f07517724c45bd1f860f770866af77d3767e9f2f0b0a9ecac9

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

          Filesize

          378KB

          MD5

          8fcfdb170413038261bd7034a5cd391b

          SHA1

          6e713020515e506b2f36767e88e456564bfc7b14

          SHA256

          62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

          SHA512

          57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

          Filesize

          378KB

          MD5

          8fcfdb170413038261bd7034a5cd391b

          SHA1

          6e713020515e506b2f36767e88e456564bfc7b14

          SHA256

          62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

          SHA512

          57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aL034bP.exe

          Filesize

          231KB

          MD5

          abb62334d4eab9828517b32104dcdb50

          SHA1

          6bdc78b99f75fdbaaf6955c3cefa14619705913a

          SHA256

          6779f7a06942ca362676ce363bce8d4313036f6ce2fa92137e6685054b1ca21f

          SHA512

          07aefc357ac6cc699e037af519686c7db3be422486c313067bdf7c47c212102f617bd941273c242d38f8a27e8d1fce9e2aa0872e3e9e1b8a76f1b74fb7b4c74f

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aL034bP.exe

          Filesize

          231KB

          MD5

          abb62334d4eab9828517b32104dcdb50

          SHA1

          6bdc78b99f75fdbaaf6955c3cefa14619705913a

          SHA256

          6779f7a06942ca362676ce363bce8d4313036f6ce2fa92137e6685054b1ca21f

          SHA512

          07aefc357ac6cc699e037af519686c7db3be422486c313067bdf7c47c212102f617bd941273c242d38f8a27e8d1fce9e2aa0872e3e9e1b8a76f1b74fb7b4c74f

        • memory/1068-36-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1068-37-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1068-39-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1068-35-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/3420-46-0x0000000006E50000-0x0000000006EE2000-memory.dmp

          Filesize

          584KB

        • memory/3420-43-0x00000000000D0000-0x000000000010E000-memory.dmp

          Filesize

          248KB

        • memory/3420-45-0x0000000007340000-0x00000000078E4000-memory.dmp

          Filesize

          5.6MB

        • memory/3420-44-0x0000000074B00000-0x00000000752B0000-memory.dmp

          Filesize

          7.7MB

        • memory/3420-47-0x00000000070A0000-0x00000000070B0000-memory.dmp

          Filesize

          64KB

        • memory/3420-48-0x0000000006F50000-0x0000000006F5A000-memory.dmp

          Filesize

          40KB

        • memory/3420-49-0x0000000007F10000-0x0000000008528000-memory.dmp

          Filesize

          6.1MB

        • memory/3420-50-0x0000000007200000-0x000000000730A000-memory.dmp

          Filesize

          1.0MB

        • memory/3420-51-0x0000000007130000-0x0000000007142000-memory.dmp

          Filesize

          72KB

        • memory/3420-52-0x0000000007190000-0x00000000071CC000-memory.dmp

          Filesize

          240KB

        • memory/3420-53-0x00000000078F0000-0x000000000793C000-memory.dmp

          Filesize

          304KB

        • memory/3420-54-0x0000000074B00000-0x00000000752B0000-memory.dmp

          Filesize

          7.7MB

        • memory/3420-55-0x00000000070A0000-0x00000000070B0000-memory.dmp

          Filesize

          64KB