Analysis

  • max time kernel
    155s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 10:01

General

  • Target

    c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe

  • Size

    907KB

  • MD5

    e2464498f3d62fa7a7002f6fc456c38c

  • SHA1

    45b5a8b89ef5c1bf8d074568c29e57bcb35c0146

  • SHA256

    c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441

  • SHA512

    c76303f07e15697751b7db599e0540648b7673512c96bc61cb9399b3d70aa3b7113ec1aadf1958a53c085510a5818ae9a9eb2602279851a6b91e1144c230e040

  • SSDEEP

    12288:WMrUy90z5BbPjuqJunQTTb7y6NvviO7fKnToEzUIyJ0j5tyI3R6JaHfSqrqLYgY:qyiBbPTunQHnygx7fKnT3wIB/SqeL/Y

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe
    "C:\Users\Admin\AppData\Local\Temp\c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5628048.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5628048.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5445000.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5445000.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1558191.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1558191.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:776
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5385333.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5385333.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1332
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1180
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:3780
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 540
                    7⤵
                    • Program crash
                    PID:556
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 576
                  6⤵
                  • Program crash
                  PID:880
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1643744.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1643744.exe
                5⤵
                • Executes dropped EXE
                PID:920
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3780 -ip 3780
        1⤵
          PID:224
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1332 -ip 1332
          1⤵
            PID:1456

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5628048.exe

            Filesize

            805KB

            MD5

            e4f04f834aef417d18f6ec2632da735e

            SHA1

            5863a89fcc5346c2b3cdfc82a3884655e75982a4

            SHA256

            01b92f4a2e831d2b34c7ab9b42f2d58528dfb49757eb1a4c23d5c9f42cedafe1

            SHA512

            5d6f814c11b0d64ce1d6fe55da8530ae552d37d9c34fa3120ec80f9b44a14c832124475a51e8b44c6e82289664828d48ac3778eb06b01e79e8a6304d487378ce

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5628048.exe

            Filesize

            805KB

            MD5

            e4f04f834aef417d18f6ec2632da735e

            SHA1

            5863a89fcc5346c2b3cdfc82a3884655e75982a4

            SHA256

            01b92f4a2e831d2b34c7ab9b42f2d58528dfb49757eb1a4c23d5c9f42cedafe1

            SHA512

            5d6f814c11b0d64ce1d6fe55da8530ae552d37d9c34fa3120ec80f9b44a14c832124475a51e8b44c6e82289664828d48ac3778eb06b01e79e8a6304d487378ce

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5445000.exe

            Filesize

            544KB

            MD5

            f136437002dd33e77565b9d51c1595b7

            SHA1

            906b8f996cc4ef639d28c037c7260937c0951579

            SHA256

            0cfe5733fa70125c969b25315324222cf4c760134931657dc4a14a2795122369

            SHA512

            87f9d390075e409c826ebc7d1249747896e53ca53c4fdf714ddbc5f65d83aeea98cda329a3a6c77fb769c19581985e26f1430fb41492999289862865b23c9592

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5445000.exe

            Filesize

            544KB

            MD5

            f136437002dd33e77565b9d51c1595b7

            SHA1

            906b8f996cc4ef639d28c037c7260937c0951579

            SHA256

            0cfe5733fa70125c969b25315324222cf4c760134931657dc4a14a2795122369

            SHA512

            87f9d390075e409c826ebc7d1249747896e53ca53c4fdf714ddbc5f65d83aeea98cda329a3a6c77fb769c19581985e26f1430fb41492999289862865b23c9592

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1558191.exe

            Filesize

            379KB

            MD5

            b90d91d16ad4035af19adda96cc7fe70

            SHA1

            883992fb08014f20f5f41866c10b1cb903846203

            SHA256

            948dbb4471314eb3108e198887b23363f72bdc30fab1a64104149638f5eeef28

            SHA512

            9b2ddbf356b0aafb433372c0e88624b0136418899098efd3c15faf6a503dc190a9da3faea56d81ff39a51a7ecff821b2ec52189dd801c46529769c5630122c55

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1558191.exe

            Filesize

            379KB

            MD5

            b90d91d16ad4035af19adda96cc7fe70

            SHA1

            883992fb08014f20f5f41866c10b1cb903846203

            SHA256

            948dbb4471314eb3108e198887b23363f72bdc30fab1a64104149638f5eeef28

            SHA512

            9b2ddbf356b0aafb433372c0e88624b0136418899098efd3c15faf6a503dc190a9da3faea56d81ff39a51a7ecff821b2ec52189dd801c46529769c5630122c55

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5385333.exe

            Filesize

            350KB

            MD5

            78e70be86b10d5b33ece9b5cea22bb2e

            SHA1

            990294794b018afab625b73eed3f1a13ec4d00f2

            SHA256

            35a71ff1771d5a9e1dfd9852be3750d865b3337eab47665c555ecc0d3a20ee6d

            SHA512

            971ad8d6bf3b8452cd2e25516e481eadc4aa2fc6f98b4cec81db373133832823a91c24fd7b1098ffadbd9afe91380937a108c707d25e303daf1673e070cd6dea

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5385333.exe

            Filesize

            350KB

            MD5

            78e70be86b10d5b33ece9b5cea22bb2e

            SHA1

            990294794b018afab625b73eed3f1a13ec4d00f2

            SHA256

            35a71ff1771d5a9e1dfd9852be3750d865b3337eab47665c555ecc0d3a20ee6d

            SHA512

            971ad8d6bf3b8452cd2e25516e481eadc4aa2fc6f98b4cec81db373133832823a91c24fd7b1098ffadbd9afe91380937a108c707d25e303daf1673e070cd6dea

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1643744.exe

            Filesize

            174KB

            MD5

            5b1daf5f3bdea645a0ef3cc7fc5c15b4

            SHA1

            b5df46a84eb6212228dbe3d1aa9d06ac35fcd07c

            SHA256

            e79d57720bf960b9eafba4d6f0a493d436b199fd019395da8bc09c3010791131

            SHA512

            a9a0cb949a30c4e650f0e6750551638954d07944942cfe7176e7e3c2ce16a8bd18ddee68e616bf37151c828fd7c5c6dacdc685277fa39d4306120671299394f1

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1643744.exe

            Filesize

            174KB

            MD5

            5b1daf5f3bdea645a0ef3cc7fc5c15b4

            SHA1

            b5df46a84eb6212228dbe3d1aa9d06ac35fcd07c

            SHA256

            e79d57720bf960b9eafba4d6f0a493d436b199fd019395da8bc09c3010791131

            SHA512

            a9a0cb949a30c4e650f0e6750551638954d07944942cfe7176e7e3c2ce16a8bd18ddee68e616bf37151c828fd7c5c6dacdc685277fa39d4306120671299394f1

          • memory/920-39-0x0000000074A80000-0x0000000075230000-memory.dmp

            Filesize

            7.7MB

          • memory/920-42-0x00000000055B0000-0x00000000055C0000-memory.dmp

            Filesize

            64KB

          • memory/920-46-0x00000000055B0000-0x00000000055C0000-memory.dmp

            Filesize

            64KB

          • memory/920-45-0x000000000ACA0000-0x000000000ACEC000-memory.dmp

            Filesize

            304KB

          • memory/920-36-0x0000000074A80000-0x0000000075230000-memory.dmp

            Filesize

            7.7MB

          • memory/920-37-0x0000000000BE0000-0x0000000000C10000-memory.dmp

            Filesize

            192KB

          • memory/920-44-0x000000000AB30000-0x000000000AB6C000-memory.dmp

            Filesize

            240KB

          • memory/920-40-0x000000000B060000-0x000000000B678000-memory.dmp

            Filesize

            6.1MB

          • memory/920-38-0x0000000005500000-0x0000000005506000-memory.dmp

            Filesize

            24KB

          • memory/920-41-0x000000000AB90000-0x000000000AC9A000-memory.dmp

            Filesize

            1.0MB

          • memory/920-43-0x000000000AAD0000-0x000000000AAE2000-memory.dmp

            Filesize

            72KB

          • memory/3780-30-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3780-32-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3780-29-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3780-28-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB