Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 14:34

General

  • Target

    49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe

  • Size

    1.2MB

  • MD5

    36c41f38b00cc021774f16f386a792eb

  • SHA1

    91c449b031fa7bbbcd320e3e0ad87b403faed296

  • SHA256

    49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513

  • SHA512

    032b5a66957ce300aa9efcb5f5975e75e3f1ac7c23a504d0df960a45acba0aaac388c519ff406da3c5c45d6afc18307a1a6b0f087f93d36544ed3d827236879a

  • SSDEEP

    24576:6ynHGvOpkdL807eJprsEj/1gs9V+OMdpyZVR8lo2QSarsRd:BnHGmpkdLNeDsy1gs9V+OMGZVR8DKoR

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
    "C:\Users\Admin\AppData\Local\Temp\49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EB1TT8bV.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EB1TT8bV.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YX8Uk6gT.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YX8Uk6gT.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iY4ZC3yg.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iY4ZC3yg.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tJ4rr5YT.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tJ4rr5YT.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1364
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hv74RA6.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hv74RA6.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:224
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:1972
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 540
                    8⤵
                    • Program crash
                    PID:2188
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 592
                  7⤵
                  • Program crash
                  PID:4692
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mk806aH.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mk806aH.exe
                6⤵
                • Executes dropped EXE
                PID:4728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1972 -ip 1972
      1⤵
        PID:2912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 224 -ip 224
        1⤵
          PID:4508
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
          1⤵
            PID:4280
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k UnistackSvcGroup
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:788

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EB1TT8bV.exe

                  Filesize

                  1.0MB

                  MD5

                  3b02425a750c9faa35ddfd0951cbc6a2

                  SHA1

                  0a3f9f78ee6ef98c62f099e8c380930cc2633b6a

                  SHA256

                  4c93c1ff6602eee614978b061eaeb7015fa11e9d6b9c19b3964c66d2ab8d3dab

                  SHA512

                  627884f53b6da2780604eb78bf9c6bcc06913e00c7503114357ec605fda3a00c228e24ed10446a26d47d9b9fd3463337ed084153dc7d10e6a2e45b3c81057a54

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EB1TT8bV.exe

                  Filesize

                  1.0MB

                  MD5

                  3b02425a750c9faa35ddfd0951cbc6a2

                  SHA1

                  0a3f9f78ee6ef98c62f099e8c380930cc2633b6a

                  SHA256

                  4c93c1ff6602eee614978b061eaeb7015fa11e9d6b9c19b3964c66d2ab8d3dab

                  SHA512

                  627884f53b6da2780604eb78bf9c6bcc06913e00c7503114357ec605fda3a00c228e24ed10446a26d47d9b9fd3463337ed084153dc7d10e6a2e45b3c81057a54

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YX8Uk6gT.exe

                  Filesize

                  878KB

                  MD5

                  fec2cc8e8484376e91ba5f4cf4697ac9

                  SHA1

                  655073c3fd0b12c70dd52e9b9c67bee2f3295121

                  SHA256

                  1a3dec608e9651b4455eb670eea4fdd764e8f02890a56095a09694a4443d34a4

                  SHA512

                  7c2cb73b7718cff61df2a509e13d5f26af5c509aa791043c1b8c93e1e938dc53aca74fd22ef1dc8baec6954cf0ee6e7c3cc0188e663a7d19703449688e8eb103

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YX8Uk6gT.exe

                  Filesize

                  878KB

                  MD5

                  fec2cc8e8484376e91ba5f4cf4697ac9

                  SHA1

                  655073c3fd0b12c70dd52e9b9c67bee2f3295121

                  SHA256

                  1a3dec608e9651b4455eb670eea4fdd764e8f02890a56095a09694a4443d34a4

                  SHA512

                  7c2cb73b7718cff61df2a509e13d5f26af5c509aa791043c1b8c93e1e938dc53aca74fd22ef1dc8baec6954cf0ee6e7c3cc0188e663a7d19703449688e8eb103

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iY4ZC3yg.exe

                  Filesize

                  584KB

                  MD5

                  0e52996626f0e9714457c6ea08d675d6

                  SHA1

                  073ac5b88f37dc29d7dbaca50365db04232238ff

                  SHA256

                  ab3288f0ff5a52266231bddb47904fb3f0648f9017a4724b06ee2c5ebfbb9476

                  SHA512

                  ed5f2204303ddfb14b0297242b26fcef816fc078a7b1983f9c0f8fef09a8a554ca948e806d844117da30e24d17b1829ac477365b8d42ddd922b74b3fe2ffa6ca

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iY4ZC3yg.exe

                  Filesize

                  584KB

                  MD5

                  0e52996626f0e9714457c6ea08d675d6

                  SHA1

                  073ac5b88f37dc29d7dbaca50365db04232238ff

                  SHA256

                  ab3288f0ff5a52266231bddb47904fb3f0648f9017a4724b06ee2c5ebfbb9476

                  SHA512

                  ed5f2204303ddfb14b0297242b26fcef816fc078a7b1983f9c0f8fef09a8a554ca948e806d844117da30e24d17b1829ac477365b8d42ddd922b74b3fe2ffa6ca

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tJ4rr5YT.exe

                  Filesize

                  412KB

                  MD5

                  a543d21b1c69522b950ec37940618f0d

                  SHA1

                  5e0a8b8c441ced8ca0828da3e944785863b605f4

                  SHA256

                  90acba38795cbed7334564da98456242fb37d6f16f239a495f5b5edcf924a958

                  SHA512

                  9552d342b0bf478783d5d3b10a4bc47ef058f9fce1d1f23ded4fde3e8c31818fea7a865ae9afccbe2112ac0cfb87c471b64ed8446b1cbdbe185417f1b8b30cd0

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tJ4rr5YT.exe

                  Filesize

                  412KB

                  MD5

                  a543d21b1c69522b950ec37940618f0d

                  SHA1

                  5e0a8b8c441ced8ca0828da3e944785863b605f4

                  SHA256

                  90acba38795cbed7334564da98456242fb37d6f16f239a495f5b5edcf924a958

                  SHA512

                  9552d342b0bf478783d5d3b10a4bc47ef058f9fce1d1f23ded4fde3e8c31818fea7a865ae9afccbe2112ac0cfb87c471b64ed8446b1cbdbe185417f1b8b30cd0

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hv74RA6.exe

                  Filesize

                  378KB

                  MD5

                  ed030761f5577cb4972e6f7dab351985

                  SHA1

                  5fcac892fd4d32949b9bb497e98b2b957e3b92e1

                  SHA256

                  a0c30d0b153beeb306b3123c21e3920da8c1ec128815b224dea81066ed7abf55

                  SHA512

                  5b8a2597eebb9640ce4fc19f8cbd4bf1ceb8ccf179b1388d7bdafbc3dae662a1870bd864ae9c8e334c31a878abda1574b4066c166bf89d2217ccb7a8c96f4734

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hv74RA6.exe

                  Filesize

                  378KB

                  MD5

                  ed030761f5577cb4972e6f7dab351985

                  SHA1

                  5fcac892fd4d32949b9bb497e98b2b957e3b92e1

                  SHA256

                  a0c30d0b153beeb306b3123c21e3920da8c1ec128815b224dea81066ed7abf55

                  SHA512

                  5b8a2597eebb9640ce4fc19f8cbd4bf1ceb8ccf179b1388d7bdafbc3dae662a1870bd864ae9c8e334c31a878abda1574b4066c166bf89d2217ccb7a8c96f4734

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mk806aH.exe

                  Filesize

                  221KB

                  MD5

                  e403630b1192a3b4be3ad2244a045a05

                  SHA1

                  f3c98799a0b0199c3cde1399c9e5d9dce97da156

                  SHA256

                  74c09b01dfbd6906a4280b33c718a3f9cbd4ab6abf8a66a9c49cd2b400a9e9cb

                  SHA512

                  d58b3cbcbd731a95ad2b9871bab7227dcc43a51e9169c72682cf834963a6cbb8442d96663880d02d534b9c289f6f569f416d9cf6aeebc4a48ed64c740a40d137

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Mk806aH.exe

                  Filesize

                  221KB

                  MD5

                  e403630b1192a3b4be3ad2244a045a05

                  SHA1

                  f3c98799a0b0199c3cde1399c9e5d9dce97da156

                  SHA256

                  74c09b01dfbd6906a4280b33c718a3f9cbd4ab6abf8a66a9c49cd2b400a9e9cb

                  SHA512

                  d58b3cbcbd731a95ad2b9871bab7227dcc43a51e9169c72682cf834963a6cbb8442d96663880d02d534b9c289f6f569f416d9cf6aeebc4a48ed64c740a40d137

                • memory/788-56-0x000001619CDA0000-0x000001619CDB0000-memory.dmp

                  Filesize

                  64KB

                • memory/788-92-0x00000161A5350000-0x00000161A5351000-memory.dmp

                  Filesize

                  4KB

                • memory/788-91-0x00000161A5240000-0x00000161A5241000-memory.dmp

                  Filesize

                  4KB

                • memory/788-90-0x00000161A5240000-0x00000161A5241000-memory.dmp

                  Filesize

                  4KB

                • memory/788-88-0x00000161A5210000-0x00000161A5211000-memory.dmp

                  Filesize

                  4KB

                • memory/788-72-0x000001619CEA0000-0x000001619CEB0000-memory.dmp

                  Filesize

                  64KB

                • memory/1972-37-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1972-39-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1972-36-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1972-35-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/4728-43-0x0000000000AB0000-0x0000000000AEE000-memory.dmp

                  Filesize

                  248KB

                • memory/4728-50-0x0000000007BE0000-0x0000000007CEA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4728-51-0x0000000007B10000-0x0000000007B22000-memory.dmp

                  Filesize

                  72KB

                • memory/4728-52-0x0000000007B70000-0x0000000007BAC000-memory.dmp

                  Filesize

                  240KB

                • memory/4728-53-0x0000000007CF0000-0x0000000007D3C000-memory.dmp

                  Filesize

                  304KB

                • memory/4728-54-0x0000000074770000-0x0000000074F20000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4728-55-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

                  Filesize

                  64KB

                • memory/4728-49-0x0000000008920000-0x0000000008F38000-memory.dmp

                  Filesize

                  6.1MB

                • memory/4728-48-0x0000000007A30000-0x0000000007A3A000-memory.dmp

                  Filesize

                  40KB

                • memory/4728-47-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

                  Filesize

                  64KB

                • memory/4728-46-0x0000000007840000-0x00000000078D2000-memory.dmp

                  Filesize

                  584KB

                • memory/4728-45-0x0000000007D50000-0x00000000082F4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4728-44-0x0000000074770000-0x0000000074F20000-memory.dmp

                  Filesize

                  7.7MB