Analysis

  • max time kernel
    143s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 12:40

General

  • Target

    5228a8bbf28b3d0b59d1f63846066256.exe

  • Size

    943KB

  • MD5

    5228a8bbf28b3d0b59d1f63846066256

  • SHA1

    1fff8f5cb0502ac4cdfdc52daafe8b26f2fd0137

  • SHA256

    7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254

  • SHA512

    0dd1d3c00fc682d329f0d07ff62758cfa6dd3f8e4015cfc7d14b3464374001df380cce47c078a13e60b15557c81006ddebc326c147cacd25629e5a80933c0633

  • SSDEEP

    24576:3y6sKOjkU35UmAbs98lWhgN8FPomRL+WOLKHh6:CvKOHpPAY98Z2gmZYa

Malware Config

Extracted

Family

redline

Botnet

leron

C2

77.91.124.55:19071

Attributes
  • auth_value

    1526055fa49b4ee6ca758d6d9d5395c9

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 4 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5228a8bbf28b3d0b59d1f63846066256.exe
    "C:\Users\Admin\AppData\Local\Temp\5228a8bbf28b3d0b59d1f63846066256.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4396
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3948
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2944
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:3524
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 540
                    7⤵
                    • Program crash
                    PID:5012
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 600
                  6⤵
                  • Program crash
                  PID:4332
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5823821.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5823821.exe
                5⤵
                • Executes dropped EXE
                PID:1436
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 928
                  6⤵
                  • Program crash
                  PID:2808
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9774157.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9774157.exe
              4⤵
              • Executes dropped EXE
              PID:3892
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0313835.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0313835.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3216
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
                PID:924
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 564
                4⤵
                • Program crash
                PID:3620
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2927516.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2927516.exe
            2⤵
            • Executes dropped EXE
            PID:2564
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3948 -ip 3948
          1⤵
            PID:4224
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3524 -ip 3524
            1⤵
              PID:2332
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1436 -ip 1436
              1⤵
                PID:4688
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3216 -ip 3216
                1⤵
                  PID:1152

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Persistence

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Privilege Escalation

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Defense Evasion

                Modify Registry

                1
                T1112

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2927516.exe
                  Filesize

                  21KB

                  MD5

                  93a0d70a8f9ea7c20d5c8550ee6fc78b

                  SHA1

                  34efd01b5d9872ded4e20f1bc4947cac6110fbe1

                  SHA256

                  79d68ee2bb0d35d7d5cfe9c07a9cadf1049ee82637f7b654b8abed0723d588bf

                  SHA512

                  391a1f5954e7fafc7dfd5809ab4a14a0980ee6d93cb78389c7da799f25235d5ab50610e6f6eefc8787ef9ee4c7ab80e779c5a95b3bb5dd66630d4d3a2525c581

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2927516.exe
                  Filesize

                  21KB

                  MD5

                  93a0d70a8f9ea7c20d5c8550ee6fc78b

                  SHA1

                  34efd01b5d9872ded4e20f1bc4947cac6110fbe1

                  SHA256

                  79d68ee2bb0d35d7d5cfe9c07a9cadf1049ee82637f7b654b8abed0723d588bf

                  SHA512

                  391a1f5954e7fafc7dfd5809ab4a14a0980ee6d93cb78389c7da799f25235d5ab50610e6f6eefc8787ef9ee4c7ab80e779c5a95b3bb5dd66630d4d3a2525c581

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
                  Filesize

                  841KB

                  MD5

                  b54bf5a8aab5fe654c06a0c29952f92e

                  SHA1

                  5da6940ca428f9ba8e18374b58421869ea1be36f

                  SHA256

                  bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79

                  SHA512

                  41eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
                  Filesize

                  841KB

                  MD5

                  b54bf5a8aab5fe654c06a0c29952f92e

                  SHA1

                  5da6940ca428f9ba8e18374b58421869ea1be36f

                  SHA256

                  bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79

                  SHA512

                  41eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0313835.exe
                  Filesize

                  413KB

                  MD5

                  c1763b7baff1b387292def6d8364ca66

                  SHA1

                  07ad4f036c9448ef016d88d7c9312c08869e87ef

                  SHA256

                  5769b13c57bd6e6f2d53d9663e244e50fdb5d87e804a2f3f9e109adaf42c2afa

                  SHA512

                  40faa52872a925bd4e1d7c102fa9bec040c612001ff5b6829ad51fca637b36e75e4065a5e23774bd2bd0fd132562e7a51ed6c943429b6cc03c380c95ded20a2b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0313835.exe
                  Filesize

                  413KB

                  MD5

                  c1763b7baff1b387292def6d8364ca66

                  SHA1

                  07ad4f036c9448ef016d88d7c9312c08869e87ef

                  SHA256

                  5769b13c57bd6e6f2d53d9663e244e50fdb5d87e804a2f3f9e109adaf42c2afa

                  SHA512

                  40faa52872a925bd4e1d7c102fa9bec040c612001ff5b6829ad51fca637b36e75e4065a5e23774bd2bd0fd132562e7a51ed6c943429b6cc03c380c95ded20a2b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
                  Filesize

                  563KB

                  MD5

                  801b230430206d35a19eb6159b99fd3f

                  SHA1

                  1f129c9f4dad72d64f209b29fd9ac7c66d32dca1

                  SHA256

                  562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c

                  SHA512

                  c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
                  Filesize

                  563KB

                  MD5

                  801b230430206d35a19eb6159b99fd3f

                  SHA1

                  1f129c9f4dad72d64f209b29fd9ac7c66d32dca1

                  SHA256

                  562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c

                  SHA512

                  c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9774157.exe
                  Filesize

                  140KB

                  MD5

                  a5168bb02ed7522f403384f5e22a03b7

                  SHA1

                  93e359c20240e9776862c205d5aadd1e3b31de7a

                  SHA256

                  55cf85cc1fe8f86ffeae39df457eaa39891f544c14aa6e957283c8e77b7f0259

                  SHA512

                  dcdfdfeb75d596e308069536f3043374a062304864fb54c8f13ff6b216d23f0dd6672e41bbec3cd2b7876032d3a45081f303e09fcdf210e0671a06ee16bab54c

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9774157.exe
                  Filesize

                  140KB

                  MD5

                  a5168bb02ed7522f403384f5e22a03b7

                  SHA1

                  93e359c20240e9776862c205d5aadd1e3b31de7a

                  SHA256

                  55cf85cc1fe8f86ffeae39df457eaa39891f544c14aa6e957283c8e77b7f0259

                  SHA512

                  dcdfdfeb75d596e308069536f3043374a062304864fb54c8f13ff6b216d23f0dd6672e41bbec3cd2b7876032d3a45081f303e09fcdf210e0671a06ee16bab54c

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
                  Filesize

                  397KB

                  MD5

                  150d459075404075f0dbbcada4949fdd

                  SHA1

                  f846c30432e6a3454e2607f4aaaed2bf6ba3b222

                  SHA256

                  d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2

                  SHA512

                  4207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
                  Filesize

                  397KB

                  MD5

                  150d459075404075f0dbbcada4949fdd

                  SHA1

                  f846c30432e6a3454e2607f4aaaed2bf6ba3b222

                  SHA256

                  d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2

                  SHA512

                  4207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
                  Filesize

                  379KB

                  MD5

                  c9b33bbac4f5be1992248a0d60b2bec8

                  SHA1

                  8816fd1e3ed09fccc35d7e8dd908966726cc50b4

                  SHA256

                  de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

                  SHA512

                  1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
                  Filesize

                  379KB

                  MD5

                  c9b33bbac4f5be1992248a0d60b2bec8

                  SHA1

                  8816fd1e3ed09fccc35d7e8dd908966726cc50b4

                  SHA256

                  de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

                  SHA512

                  1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5823821.exe
                  Filesize

                  174KB

                  MD5

                  2ee3248753b6d87659573feff0d956aa

                  SHA1

                  877f3db2d93c3cc020bf85274b5ddfdc1183d864

                  SHA256

                  6f43179b1514e490b060f87f11726da0067077797f04e9078084cabaa09d3327

                  SHA512

                  fb64b0335b47521a383cd8fd17bdae76b97777edd2253dc83971ada2d05fb6a70198ce88eaa4f36cf6daaab9e4a5216c52b36ad8be4d5a53d7728877d66ee007

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5823821.exe
                  Filesize

                  174KB

                  MD5

                  2ee3248753b6d87659573feff0d956aa

                  SHA1

                  877f3db2d93c3cc020bf85274b5ddfdc1183d864

                  SHA256

                  6f43179b1514e490b060f87f11726da0067077797f04e9078084cabaa09d3327

                  SHA512

                  fb64b0335b47521a383cd8fd17bdae76b97777edd2253dc83971ada2d05fb6a70198ce88eaa4f36cf6daaab9e4a5216c52b36ad8be4d5a53d7728877d66ee007

                • memory/924-57-0x0000000074190000-0x0000000074940000-memory.dmp
                  Filesize

                  7.7MB

                • memory/924-55-0x0000000005190000-0x00000000051CC000-memory.dmp
                  Filesize

                  240KB

                • memory/924-56-0x00000000051D0000-0x000000000521C000-memory.dmp
                  Filesize

                  304KB

                • memory/924-53-0x0000000005140000-0x0000000005150000-memory.dmp
                  Filesize

                  64KB

                • memory/924-58-0x0000000005140000-0x0000000005150000-memory.dmp
                  Filesize

                  64KB

                • memory/924-45-0x0000000000400000-0x0000000000430000-memory.dmp
                  Filesize

                  192KB

                • memory/924-46-0x0000000074190000-0x0000000074940000-memory.dmp
                  Filesize

                  7.7MB

                • memory/924-47-0x0000000000FB0000-0x0000000000FB6000-memory.dmp
                  Filesize

                  24KB

                • memory/924-54-0x0000000005110000-0x0000000005122000-memory.dmp
                  Filesize

                  72KB

                • memory/924-52-0x0000000005260000-0x000000000536A000-memory.dmp
                  Filesize

                  1.0MB

                • memory/924-51-0x0000000005770000-0x0000000005D88000-memory.dmp
                  Filesize

                  6.1MB

                • memory/1436-38-0x0000000074620000-0x0000000074DD0000-memory.dmp
                  Filesize

                  7.7MB

                • memory/1436-37-0x0000000074620000-0x0000000074DD0000-memory.dmp
                  Filesize

                  7.7MB

                • memory/1436-36-0x0000000000490000-0x00000000004C0000-memory.dmp
                  Filesize

                  192KB

                • memory/3524-32-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/3524-30-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/3524-29-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/3524-28-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB