Analysis

  • max time kernel
    187s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 07:53

General

  • Target

    a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe

  • Size

    1.1MB

  • MD5

    1df6580a995989ea0cb8d5c35ff737e2

  • SHA1

    ebbfb339b894138c10c542fcfabb4b26e21fae3b

  • SHA256

    a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf

  • SHA512

    a488bb387610ec56b1716ecb7fd8d3d6f272617df9ea2325c43d620355ceed5514cea5cda18cf0e7023bde733493e23cf2f37a7f66fd0a0b85e56101c136bf48

  • SSDEEP

    24576:8yCEH2Pui4A+s/ob83ocv8lP2CnRd/3ci53Vxlx:r72r4A+6s8YhP2GRd9VVn

Malware Config

Extracted

Family

redline

Botnet

lunka

C2

77.91.124.55:19071

Attributes
  • auth_value

    8284484633d18d383ea4ff83c0af43ca

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe
    "C:\Users\Admin\AppData\Local\Temp\a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6821480.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6821480.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5073654.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5073654.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3768
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3665401.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3665401.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4984
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2690086.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2690086.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3144
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:3692
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 540
                  7⤵
                  • Program crash
                  PID:4172
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 140
                6⤵
                • Program crash
                PID:3900
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885283.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885283.exe
              5⤵
              • Executes dropped EXE
              PID:5112
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 928
                6⤵
                • Program crash
                PID:868
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exe
            4⤵
            • Executes dropped EXE
            PID:5096
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2320570.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2320570.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2184
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:3800
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 156
              4⤵
              • Program crash
              PID:3048
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4804205.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4804205.exe
          2⤵
          • Executes dropped EXE
          PID:4784
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3144 -ip 3144
        1⤵
          PID:3688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3692 -ip 3692
          1⤵
            PID:3924
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5112 -ip 5112
            1⤵
              PID:1220
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2184 -ip 2184
              1⤵
                PID:4052

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Defense Evasion

              Modify Registry

              1
              T1112

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4804205.exe
                Filesize

                22KB

                MD5

                2be3a9657fa722ccbc54af753d7cae10

                SHA1

                68b2cccae59b9b4312f48db41c4849adbd3531bf

                SHA256

                b4b2ea34d9cce16fb144ef6fff26df4a059ce6d818f25aed609d904667925e0a

                SHA512

                d0275387576bdeeddaccc835e11fe8dcca2d159bf93fb263c1545254d31584fce040057973cfc1db7c5ba1d1e459d50f635c751bb3d22b16e475ba74baf079c0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4804205.exe
                Filesize

                22KB

                MD5

                2be3a9657fa722ccbc54af753d7cae10

                SHA1

                68b2cccae59b9b4312f48db41c4849adbd3531bf

                SHA256

                b4b2ea34d9cce16fb144ef6fff26df4a059ce6d818f25aed609d904667925e0a

                SHA512

                d0275387576bdeeddaccc835e11fe8dcca2d159bf93fb263c1545254d31584fce040057973cfc1db7c5ba1d1e459d50f635c751bb3d22b16e475ba74baf079c0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6821480.exe
                Filesize

                1.0MB

                MD5

                eff3282f20178ce92e2f236a9652733d

                SHA1

                40f6801700aae2d528852886036e81aefc054390

                SHA256

                c5673cc3c3ae9790389381ff1ea25c980c3e9c4c812634b8f9442224de70c95b

                SHA512

                b449c5c27131a5e2308dd99da78694af892b3cff622483e30d344c858535a6159a02ae1dff2096c6f3b761179df90b98ebe6d5d3f94a7150811f498b6034da01

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6821480.exe
                Filesize

                1.0MB

                MD5

                eff3282f20178ce92e2f236a9652733d

                SHA1

                40f6801700aae2d528852886036e81aefc054390

                SHA256

                c5673cc3c3ae9790389381ff1ea25c980c3e9c4c812634b8f9442224de70c95b

                SHA512

                b449c5c27131a5e2308dd99da78694af892b3cff622483e30d344c858535a6159a02ae1dff2096c6f3b761179df90b98ebe6d5d3f94a7150811f498b6034da01

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2320570.exe
                Filesize

                1.0MB

                MD5

                c65830f5657d1c658deab65834c83ba0

                SHA1

                99ab355e37a62d2f57489b36a3ced883b069cfdd

                SHA256

                21b3d740640d36442d97bef8ae3b479a2654b58f0771d7abf074a35870298e6c

                SHA512

                19b87d8c0967f50647077befba15d1b40d3023d15fe3a3f3ce15c6b835ce30fb8c3f8ffd9a005871de10a6b36eaa1891466a6b6a94a234edb345f0884f3be7f0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2320570.exe
                Filesize

                1.0MB

                MD5

                c65830f5657d1c658deab65834c83ba0

                SHA1

                99ab355e37a62d2f57489b36a3ced883b069cfdd

                SHA256

                21b3d740640d36442d97bef8ae3b479a2654b58f0771d7abf074a35870298e6c

                SHA512

                19b87d8c0967f50647077befba15d1b40d3023d15fe3a3f3ce15c6b835ce30fb8c3f8ffd9a005871de10a6b36eaa1891466a6b6a94a234edb345f0884f3be7f0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5073654.exe
                Filesize

                675KB

                MD5

                1ff91772fbc577fcbc22adc0698cb32b

                SHA1

                ca0f6e413565cc9821531fec29022bde7a7b13c4

                SHA256

                7bf0d15d752e939973883010a6ceea5accfde4a68aa4efd02a5b857c3d26d40b

                SHA512

                5ec7ffaa8b8db26f02dd499224812850ead59318b7b58c18fdc751f38ec471fe66b5a9f49ef016af889504c24d2a1a36638007746ed7985ebf8c5ad742e66b63

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5073654.exe
                Filesize

                675KB

                MD5

                1ff91772fbc577fcbc22adc0698cb32b

                SHA1

                ca0f6e413565cc9821531fec29022bde7a7b13c4

                SHA256

                7bf0d15d752e939973883010a6ceea5accfde4a68aa4efd02a5b857c3d26d40b

                SHA512

                5ec7ffaa8b8db26f02dd499224812850ead59318b7b58c18fdc751f38ec471fe66b5a9f49ef016af889504c24d2a1a36638007746ed7985ebf8c5ad742e66b63

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exe
                Filesize

                141KB

                MD5

                aad4251df3f423defe0de4aeef8295f0

                SHA1

                bc9ed4c3ac7f073a51768ab06210be9f339a988d

                SHA256

                9c0af5c15653e4ba72ca4de7eea32713cb0212fc0e92efffdf45de3fa8fd0927

                SHA512

                0c9838fbca875c653c9b300776a8cd1a2a63f68b6d155a178911ec470b8d81f7ddb122a0c6cbc4502c7e8757f1ff4a346a9f3856abcfebfbcaeef8df675a7d65

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exe
                Filesize

                141KB

                MD5

                aad4251df3f423defe0de4aeef8295f0

                SHA1

                bc9ed4c3ac7f073a51768ab06210be9f339a988d

                SHA256

                9c0af5c15653e4ba72ca4de7eea32713cb0212fc0e92efffdf45de3fa8fd0927

                SHA512

                0c9838fbca875c653c9b300776a8cd1a2a63f68b6d155a178911ec470b8d81f7ddb122a0c6cbc4502c7e8757f1ff4a346a9f3856abcfebfbcaeef8df675a7d65

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3665401.exe
                Filesize

                509KB

                MD5

                db6340dc329f7a3ca138eea77cb68d3c

                SHA1

                c46a6d5522656915dd5a989da8015da34b6defde

                SHA256

                aa9cfad00fbe9449865cdbd51e72f6c736ecb57f385fa046e9ffcca8eddbd051

                SHA512

                cf2c2727fb4a1a71e70caf41282336a80104402392e51376eb282beafbe68c85da8eb01d11263e3ce2084d9cf6b4332dc0e2209929ac2ae152f28c582116e057

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3665401.exe
                Filesize

                509KB

                MD5

                db6340dc329f7a3ca138eea77cb68d3c

                SHA1

                c46a6d5522656915dd5a989da8015da34b6defde

                SHA256

                aa9cfad00fbe9449865cdbd51e72f6c736ecb57f385fa046e9ffcca8eddbd051

                SHA512

                cf2c2727fb4a1a71e70caf41282336a80104402392e51376eb282beafbe68c85da8eb01d11263e3ce2084d9cf6b4332dc0e2209929ac2ae152f28c582116e057

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2690086.exe
                Filesize

                1016KB

                MD5

                689c0e063648a337b2dfa98ec0f6b348

                SHA1

                ab820d06a740b02554fbe56718fc412dc0e598c0

                SHA256

                8b5e36ac7e0f5b4da3aa68da48b0961ab22a93ebde31d0f562462766bba27bc2

                SHA512

                afbd2693f58f980bdb8490ec840816788aedc903c407dc36226054b1215631d42955906f16309d0d139c375e798ad5e8f700aeae43331c880942b87aa8e76263

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2690086.exe
                Filesize

                1016KB

                MD5

                689c0e063648a337b2dfa98ec0f6b348

                SHA1

                ab820d06a740b02554fbe56718fc412dc0e598c0

                SHA256

                8b5e36ac7e0f5b4da3aa68da48b0961ab22a93ebde31d0f562462766bba27bc2

                SHA512

                afbd2693f58f980bdb8490ec840816788aedc903c407dc36226054b1215631d42955906f16309d0d139c375e798ad5e8f700aeae43331c880942b87aa8e76263

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885283.exe
                Filesize

                174KB

                MD5

                96eb40acc2a9e29a292ed822d7684e26

                SHA1

                2e9fd8b338ff579f46ec76b7fc5bf840eeb3fcd4

                SHA256

                66ba5d890bda13ed0966c9ac9ae5506b455c2a0a059a882053d6fc7f32ef65f9

                SHA512

                ec2b1b7231e54c5100ae2013e107c0a22576aedd56642c440c58b5b0720b73c5953fe981ac5426531547192a731b83f99fc6fe31d227da67687aeeb38c3d91a2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885283.exe
                Filesize

                174KB

                MD5

                96eb40acc2a9e29a292ed822d7684e26

                SHA1

                2e9fd8b338ff579f46ec76b7fc5bf840eeb3fcd4

                SHA256

                66ba5d890bda13ed0966c9ac9ae5506b455c2a0a059a882053d6fc7f32ef65f9

                SHA512

                ec2b1b7231e54c5100ae2013e107c0a22576aedd56642c440c58b5b0720b73c5953fe981ac5426531547192a731b83f99fc6fe31d227da67687aeeb38c3d91a2

              • memory/3692-28-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/3692-32-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/3692-29-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/3692-30-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/3800-45-0x0000000000400000-0x0000000000430000-memory.dmp
                Filesize

                192KB

              • memory/3800-55-0x000000000AA60000-0x000000000AA72000-memory.dmp
                Filesize

                72KB

              • memory/3800-46-0x0000000073780000-0x0000000073F30000-memory.dmp
                Filesize

                7.7MB

              • memory/3800-47-0x0000000073780000-0x0000000073F30000-memory.dmp
                Filesize

                7.7MB

              • memory/3800-58-0x0000000005100000-0x0000000005110000-memory.dmp
                Filesize

                64KB

              • memory/3800-57-0x000000000AC40000-0x000000000AC8C000-memory.dmp
                Filesize

                304KB

              • memory/3800-51-0x00000000050E0000-0x00000000050E6000-memory.dmp
                Filesize

                24KB

              • memory/3800-52-0x000000000AD30000-0x000000000B348000-memory.dmp
                Filesize

                6.1MB

              • memory/3800-53-0x000000000AB30000-0x000000000AC3A000-memory.dmp
                Filesize

                1.0MB

              • memory/3800-54-0x0000000005100000-0x0000000005110000-memory.dmp
                Filesize

                64KB

              • memory/3800-56-0x000000000AAC0000-0x000000000AAFC000-memory.dmp
                Filesize

                240KB

              • memory/5112-38-0x0000000073C20000-0x00000000743D0000-memory.dmp
                Filesize

                7.7MB

              • memory/5112-37-0x0000000073C20000-0x00000000743D0000-memory.dmp
                Filesize

                7.7MB

              • memory/5112-36-0x0000000000C60000-0x0000000000C90000-memory.dmp
                Filesize

                192KB