Analysis

  • max time kernel
    179s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2023 22:51

General

  • Target

    15ed191ba76383decb3024925d8944f9.exe

  • Size

    1.1MB

  • MD5

    15ed191ba76383decb3024925d8944f9

  • SHA1

    0ab8a7a0c7c2d924e750c4d6feda97dafbff921d

  • SHA256

    1c3715533760b25561a481466c9d5187f70c4767b4c78d3b2b80f03e2e7d5055

  • SHA512

    61e760cbb395c6ad17990ad17daadda6dc64c99b711fcdc19578104c58c9ba458c5ed5eb8ee43a43e5a239b46ea12d377c72824e99708ff8b4a0fa777023dbe1

  • SSDEEP

    24576:+yiPXwqPUe66Wo6QtymBGypUhK1dfK/3bCpm560jv:NiPgqF1BVA6ZpUhyyI6

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ed191ba76383decb3024925d8944f9.exe
    "C:\Users\Admin\AppData\Local\Temp\15ed191ba76383decb3024925d8944f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5429875.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5429875.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9252389.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9252389.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9841477.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9841477.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4620
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1080072.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1080072.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6632828.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6632828.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2736
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1324
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 576
                7⤵
                • Program crash
                PID:2776
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1789932.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1789932.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3436
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:4172
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 540
                    8⤵
                    • Program crash
                    PID:680
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 152
                  7⤵
                  • Program crash
                  PID:3332
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4143459.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4143459.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1876
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:1716
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:1676
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    6⤵
                      PID:4848
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 596
                      6⤵
                      • Program crash
                      PID:3244
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2736 -ip 2736
            1⤵
              PID:4792
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3436 -ip 3436
              1⤵
                PID:5036
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4172 -ip 4172
                1⤵
                  PID:3008
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1876 -ip 1876
                  1⤵
                    PID:4792

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                    Filesize

                    226B

                    MD5

                    916851e072fbabc4796d8916c5131092

                    SHA1

                    d48a602229a690c512d5fdaf4c8d77547a88e7a2

                    SHA256

                    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                    SHA512

                    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5429875.exe
                    Filesize

                    982KB

                    MD5

                    6d2e206c17953fdf03bfe699b102bd92

                    SHA1

                    8ba096ebc3474c2393b97dd62a6522135719ee70

                    SHA256

                    2043b3dbca5bdccd5fe5ee37b95a131314a5bfca56bad4a4a6de28c740c5598c

                    SHA512

                    ee9399601721c7ab425a6b95ac45006bafa9bfec67a1afd716f1e29c7c33ec1a0f00d98f78392f79cdc2663e34f294118cd8ef064fcd9c2791d0a02afb46ecdd

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5429875.exe
                    Filesize

                    982KB

                    MD5

                    6d2e206c17953fdf03bfe699b102bd92

                    SHA1

                    8ba096ebc3474c2393b97dd62a6522135719ee70

                    SHA256

                    2043b3dbca5bdccd5fe5ee37b95a131314a5bfca56bad4a4a6de28c740c5598c

                    SHA512

                    ee9399601721c7ab425a6b95ac45006bafa9bfec67a1afd716f1e29c7c33ec1a0f00d98f78392f79cdc2663e34f294118cd8ef064fcd9c2791d0a02afb46ecdd

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9252389.exe
                    Filesize

                    799KB

                    MD5

                    cdc0890addb5ca384c43c035adde147d

                    SHA1

                    689aec7545cbd7abafa8119deb5ec4e7791bf6c7

                    SHA256

                    53adbd0da3133f3cdc482f6228daadcb8ebd8ff0609f5f7331d1148963d5837f

                    SHA512

                    043104bb3a09f9e31b015f1e7aff170e1743ce1f495a3a3b68ba69a29aab6665baf3b2f657713a6d36e69edd7cef574199f825f775dca82fd4bc4ed7519a7fd8

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9252389.exe
                    Filesize

                    799KB

                    MD5

                    cdc0890addb5ca384c43c035adde147d

                    SHA1

                    689aec7545cbd7abafa8119deb5ec4e7791bf6c7

                    SHA256

                    53adbd0da3133f3cdc482f6228daadcb8ebd8ff0609f5f7331d1148963d5837f

                    SHA512

                    043104bb3a09f9e31b015f1e7aff170e1743ce1f495a3a3b68ba69a29aab6665baf3b2f657713a6d36e69edd7cef574199f825f775dca82fd4bc4ed7519a7fd8

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9841477.exe
                    Filesize

                    617KB

                    MD5

                    b5cfcb671f8c833cbff6464b1c9a097f

                    SHA1

                    8e041ab0e966c758799bd28930b2a763080fabc7

                    SHA256

                    f85ab13c1d1a7765f0500c0bbc59b621f11ab44d2b4ec68b227948099c09ec3b

                    SHA512

                    60f16d9d67644de9218dc067f6e4ee13f7ef18ab750a746e13078877d6ad5d005594cd08bdb455a1f3802bc946cd75d18ff221c459b34a9e47abb7f3d6777224

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9841477.exe
                    Filesize

                    617KB

                    MD5

                    b5cfcb671f8c833cbff6464b1c9a097f

                    SHA1

                    8e041ab0e966c758799bd28930b2a763080fabc7

                    SHA256

                    f85ab13c1d1a7765f0500c0bbc59b621f11ab44d2b4ec68b227948099c09ec3b

                    SHA512

                    60f16d9d67644de9218dc067f6e4ee13f7ef18ab750a746e13078877d6ad5d005594cd08bdb455a1f3802bc946cd75d18ff221c459b34a9e47abb7f3d6777224

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4143459.exe
                    Filesize

                    390KB

                    MD5

                    96d0e2e816815ef8c84528a4c7583d57

                    SHA1

                    b913b0a451cbbf2bad29dfd6867f0da0e351ba59

                    SHA256

                    de183ecdc9e377993b62feca352ca9a489e36a7cb160e20a14b1e3f179f8958b

                    SHA512

                    519ccd39cc3bd47036c769f163b921f094becee458eaa52fc0809522b60de42d43cd44e88c3a07ebb0ad7fb518a04c904b13526bdcc4427be23b54aa159da26b

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4143459.exe
                    Filesize

                    390KB

                    MD5

                    96d0e2e816815ef8c84528a4c7583d57

                    SHA1

                    b913b0a451cbbf2bad29dfd6867f0da0e351ba59

                    SHA256

                    de183ecdc9e377993b62feca352ca9a489e36a7cb160e20a14b1e3f179f8958b

                    SHA512

                    519ccd39cc3bd47036c769f163b921f094becee458eaa52fc0809522b60de42d43cd44e88c3a07ebb0ad7fb518a04c904b13526bdcc4427be23b54aa159da26b

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1080072.exe
                    Filesize

                    346KB

                    MD5

                    23d0e64b5fbe8618c011067116c80904

                    SHA1

                    90b38f56c4d801bc03d569b006cda35b0a0e903f

                    SHA256

                    f7f5a1cee81f1650298b0d389341089cf8b70cb79887941dacfd5874b4040d21

                    SHA512

                    1858c6a0cf0454a4a7ca2d756918c8d383f50a52cced36325f06ba3b46ee0963f989ac4768022686e2a04756c374fd8e521a8b32f6fe4eb6a79a8c245e8ddb85

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1080072.exe
                    Filesize

                    346KB

                    MD5

                    23d0e64b5fbe8618c011067116c80904

                    SHA1

                    90b38f56c4d801bc03d569b006cda35b0a0e903f

                    SHA256

                    f7f5a1cee81f1650298b0d389341089cf8b70cb79887941dacfd5874b4040d21

                    SHA512

                    1858c6a0cf0454a4a7ca2d756918c8d383f50a52cced36325f06ba3b46ee0963f989ac4768022686e2a04756c374fd8e521a8b32f6fe4eb6a79a8c245e8ddb85

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6632828.exe
                    Filesize

                    227KB

                    MD5

                    a29ae45a7ad30802304923d3ff815082

                    SHA1

                    90da5749e10ad60f18c81316d5d19e9ef457c4c1

                    SHA256

                    7f0be7a88420c68521f4ce0168a84ffd0f88c685555d87031e2ae3bbee85ef15

                    SHA512

                    e20770c4aac53cc3431ce464593fe5a5dbfe66a80d254e5cc12b38b568374e0fd5459cb9afe4b58fdf2ebeb50af6ab698f98a73605cb0045b1774d48da74b315

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6632828.exe
                    Filesize

                    227KB

                    MD5

                    a29ae45a7ad30802304923d3ff815082

                    SHA1

                    90da5749e10ad60f18c81316d5d19e9ef457c4c1

                    SHA256

                    7f0be7a88420c68521f4ce0168a84ffd0f88c685555d87031e2ae3bbee85ef15

                    SHA512

                    e20770c4aac53cc3431ce464593fe5a5dbfe66a80d254e5cc12b38b568374e0fd5459cb9afe4b58fdf2ebeb50af6ab698f98a73605cb0045b1774d48da74b315

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1789932.exe
                    Filesize

                    356KB

                    MD5

                    b9f4e79159d1fd945a662d2979d638c8

                    SHA1

                    4ca4fb54694832fd2832c8a9408853156d19d1f1

                    SHA256

                    e5b5215f41c008484e991c33766ef811b4a79bc6b008c34355b13fe2ae4ef7d2

                    SHA512

                    1d234be4af88b4f628e917fffa6b158936044f4199db9f59cc8c05f0d0fd9f60d2504e001ed0a10821b6228b8c921ac375815660cce02f8574ff18d0c8f44181

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1789932.exe
                    Filesize

                    356KB

                    MD5

                    b9f4e79159d1fd945a662d2979d638c8

                    SHA1

                    4ca4fb54694832fd2832c8a9408853156d19d1f1

                    SHA256

                    e5b5215f41c008484e991c33766ef811b4a79bc6b008c34355b13fe2ae4ef7d2

                    SHA512

                    1d234be4af88b4f628e917fffa6b158936044f4199db9f59cc8c05f0d0fd9f60d2504e001ed0a10821b6228b8c921ac375815660cce02f8574ff18d0c8f44181

                  • memory/1324-37-0x0000000074220000-0x00000000749D0000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/1324-39-0x0000000074220000-0x00000000749D0000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/1324-36-0x0000000074220000-0x00000000749D0000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/1324-35-0x0000000000400000-0x000000000040A000-memory.dmp
                    Filesize

                    40KB

                  • memory/4172-43-0x0000000000400000-0x0000000000428000-memory.dmp
                    Filesize

                    160KB

                  • memory/4172-44-0x0000000000400000-0x0000000000428000-memory.dmp
                    Filesize

                    160KB

                  • memory/4172-45-0x0000000000400000-0x0000000000428000-memory.dmp
                    Filesize

                    160KB

                  • memory/4172-47-0x0000000000400000-0x0000000000428000-memory.dmp
                    Filesize

                    160KB

                  • memory/4848-51-0x0000000000400000-0x0000000000430000-memory.dmp
                    Filesize

                    192KB

                  • memory/4848-53-0x0000000073E80000-0x0000000074630000-memory.dmp
                    Filesize

                    7.7MB