Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 10:22

General

  • Target

    54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe

  • Size

    907KB

  • MD5

    d616908509e9883f36385ffb9d9e81c3

  • SHA1

    486d67f400c41fe42c0edbadf1f7b1118fdca355

  • SHA256

    54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc

  • SHA512

    2f93b714aaba7b054f9673193084505c5da932031eecc668806cdabde9ed3349c9ddf02ff84276a0c43007494e3473b3367dc3113efc2ffdae7504df45ee3baf

  • SSDEEP

    12288:pMrty90qFZSi7NS6+OY04Lr6W7rmpJ+6nJOfpvDKJXx9mv9omv9sLVJ2LvKDs4UV:AyNZbNnqMHOxgABI2LALg4oQwaFs

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe
    "C:\Users\Admin\AppData\Local\Temp\54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9275033.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9275033.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2925570.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2925570.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3337893.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3337893.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3036857.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3036857.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3784
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4684
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 540
                  7⤵
                  • Program crash
                  PID:3928
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 552
                6⤵
                • Program crash
                PID:2560
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7583879.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7583879.exe
              5⤵
              • Executes dropped EXE
              PID:5052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3784 -ip 3784
      1⤵
        PID:3644
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4684 -ip 4684
        1⤵
          PID:2924

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9275033.exe

          Filesize

          805KB

          MD5

          0411adc513784270e2d87e2db15a2c92

          SHA1

          61fc634e13084bf025d19ff790556c99dd6bfc56

          SHA256

          cef749f25b9206c3924ef8429505f28ff69903de88c4e7415a7842f606f107ea

          SHA512

          401c3bde03d3964ab8e943fc6fc3fe7e7ca1a5467aba0f093f766b6830aa12db4c8542293eae1e31c491cf5f483e7e61591ea3b00bb12afc3ef1b26f4c3ac20d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9275033.exe

          Filesize

          805KB

          MD5

          0411adc513784270e2d87e2db15a2c92

          SHA1

          61fc634e13084bf025d19ff790556c99dd6bfc56

          SHA256

          cef749f25b9206c3924ef8429505f28ff69903de88c4e7415a7842f606f107ea

          SHA512

          401c3bde03d3964ab8e943fc6fc3fe7e7ca1a5467aba0f093f766b6830aa12db4c8542293eae1e31c491cf5f483e7e61591ea3b00bb12afc3ef1b26f4c3ac20d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2925570.exe

          Filesize

          545KB

          MD5

          3b957b9ae981af805498bfbdc598456b

          SHA1

          6e51e31cbb7da0c668d7d2d4ab69402812f9a21d

          SHA256

          babcfbbae56226d8264b2a7be09aebc5f9b72a64896caf1a7af1f4ed6203b41d

          SHA512

          3dc5f8780ccf3ded70e7f0467aa725bd1f0821d6d1be29ceb2fa58d4ec5725edb05f7597b84302257b54ef474948849d82dbb6ee468bfb6b986ac55991d044b3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2925570.exe

          Filesize

          545KB

          MD5

          3b957b9ae981af805498bfbdc598456b

          SHA1

          6e51e31cbb7da0c668d7d2d4ab69402812f9a21d

          SHA256

          babcfbbae56226d8264b2a7be09aebc5f9b72a64896caf1a7af1f4ed6203b41d

          SHA512

          3dc5f8780ccf3ded70e7f0467aa725bd1f0821d6d1be29ceb2fa58d4ec5725edb05f7597b84302257b54ef474948849d82dbb6ee468bfb6b986ac55991d044b3

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3337893.exe

          Filesize

          379KB

          MD5

          96763d6b47056e2fd4026a3fa2ec798f

          SHA1

          bdd5c17f257702861b88237e9b38959886ce43ec

          SHA256

          551fb60429c7ad203eb4b8efb17766250778315a21ee460246d71947219315f3

          SHA512

          97e7794b0a2f3c4aae4083c1daf6602d1214cf240b48b5496d9700534e2f56778930873410b8624ab65006e6c187ac50b98ebe57959542db1fe3804211b20328

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3337893.exe

          Filesize

          379KB

          MD5

          96763d6b47056e2fd4026a3fa2ec798f

          SHA1

          bdd5c17f257702861b88237e9b38959886ce43ec

          SHA256

          551fb60429c7ad203eb4b8efb17766250778315a21ee460246d71947219315f3

          SHA512

          97e7794b0a2f3c4aae4083c1daf6602d1214cf240b48b5496d9700534e2f56778930873410b8624ab65006e6c187ac50b98ebe57959542db1fe3804211b20328

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3036857.exe

          Filesize

          350KB

          MD5

          fda434a977402b6844f3723e18d486bd

          SHA1

          c4da98374afc11b79d2455aed30fa30e18cd3afd

          SHA256

          3ca6c8fa0e45c360a78b9be55080ce8ec7a9b0e8903d1ccddf359e5a3e031f40

          SHA512

          df837602f8e453dccbef544716c0df3c48fafe8536a2e450fad9854b6d6d072d1a5a364275fd3130bb09ef064ab9326873bd9ceb0dd10e15ffbdba22c49e29df

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3036857.exe

          Filesize

          350KB

          MD5

          fda434a977402b6844f3723e18d486bd

          SHA1

          c4da98374afc11b79d2455aed30fa30e18cd3afd

          SHA256

          3ca6c8fa0e45c360a78b9be55080ce8ec7a9b0e8903d1ccddf359e5a3e031f40

          SHA512

          df837602f8e453dccbef544716c0df3c48fafe8536a2e450fad9854b6d6d072d1a5a364275fd3130bb09ef064ab9326873bd9ceb0dd10e15ffbdba22c49e29df

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7583879.exe

          Filesize

          174KB

          MD5

          8480c2330f55aac717cbe0e152a42ee2

          SHA1

          b1f38b67aee59a5514a1b151f893f25886f16ba2

          SHA256

          dd0f7d3babd405a7c169d461208c3a558957f83728fb1e6421fd568c0c36b02f

          SHA512

          11a0de752f24d1ff0387e9dc0ccc4d60fd989de84f653a33623f7bc5be5b29a2881f0e076fc5cf1b0d3803e1eb0df37e1682c8a5a7bf5d0de8c490bb5e227a75

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7583879.exe

          Filesize

          174KB

          MD5

          8480c2330f55aac717cbe0e152a42ee2

          SHA1

          b1f38b67aee59a5514a1b151f893f25886f16ba2

          SHA256

          dd0f7d3babd405a7c169d461208c3a558957f83728fb1e6421fd568c0c36b02f

          SHA512

          11a0de752f24d1ff0387e9dc0ccc4d60fd989de84f653a33623f7bc5be5b29a2881f0e076fc5cf1b0d3803e1eb0df37e1682c8a5a7bf5d0de8c490bb5e227a75

        • memory/4684-29-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/4684-30-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/4684-32-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/4684-28-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/5052-39-0x0000000006010000-0x0000000006628000-memory.dmp

          Filesize

          6.1MB

        • memory/5052-37-0x0000000074270000-0x0000000074A20000-memory.dmp

          Filesize

          7.7MB

        • memory/5052-38-0x0000000005970000-0x0000000005976000-memory.dmp

          Filesize

          24KB

        • memory/5052-36-0x0000000000F10000-0x0000000000F40000-memory.dmp

          Filesize

          192KB

        • memory/5052-40-0x0000000005B00000-0x0000000005C0A000-memory.dmp

          Filesize

          1.0MB

        • memory/5052-42-0x00000000059F0000-0x0000000005A02000-memory.dmp

          Filesize

          72KB

        • memory/5052-41-0x00000000059E0000-0x00000000059F0000-memory.dmp

          Filesize

          64KB

        • memory/5052-43-0x0000000005A50000-0x0000000005A8C000-memory.dmp

          Filesize

          240KB

        • memory/5052-44-0x0000000005A90000-0x0000000005ADC000-memory.dmp

          Filesize

          304KB

        • memory/5052-45-0x0000000074270000-0x0000000074A20000-memory.dmp

          Filesize

          7.7MB

        • memory/5052-46-0x00000000059E0000-0x00000000059F0000-memory.dmp

          Filesize

          64KB