Analysis

  • max time kernel
    155s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 12:40

General

  • Target

    7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe

  • Size

    943KB

  • MD5

    5228a8bbf28b3d0b59d1f63846066256

  • SHA1

    1fff8f5cb0502ac4cdfdc52daafe8b26f2fd0137

  • SHA256

    7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254

  • SHA512

    0dd1d3c00fc682d329f0d07ff62758cfa6dd3f8e4015cfc7d14b3464374001df380cce47c078a13e60b15557c81006ddebc326c147cacd25629e5a80933c0633

  • SSDEEP

    24576:3y6sKOjkU35UmAbs98lWhgN8FPomRL+WOLKHh6:CvKOHpPAY98Z2gmZYa

Malware Config

Extracted

Family

redline

Botnet

leron

C2

77.91.124.55:19071

Attributes
  • auth_value

    1526055fa49b4ee6ca758d6d9d5395c9

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe
    "C:\Users\Admin\AppData\Local\Temp\7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1204
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4820
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4192
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4976
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 540
                  7⤵
                  • Program crash
                  PID:1156
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 564
                6⤵
                • Program crash
                PID:3456
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5823821.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5823821.exe
              5⤵
              • Executes dropped EXE
              PID:1672
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 928
                6⤵
                • Program crash
                PID:3980
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9774157.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9774157.exe
            4⤵
            • Executes dropped EXE
            PID:4008
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0313835.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0313835.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:8
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 572
              4⤵
              • Program crash
              PID:4460
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2927516.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2927516.exe
          2⤵
          • Executes dropped EXE
          PID:2248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4192 -ip 4192
        1⤵
          PID:4072
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4976 -ip 4976
          1⤵
            PID:1972
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1672 -ip 1672
            1⤵
              PID:3100
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4444 -ip 4444
              1⤵
                PID:2628

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Defense Evasion

              Modify Registry

              1
              T1112

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2927516.exe
                Filesize

                21KB

                MD5

                93a0d70a8f9ea7c20d5c8550ee6fc78b

                SHA1

                34efd01b5d9872ded4e20f1bc4947cac6110fbe1

                SHA256

                79d68ee2bb0d35d7d5cfe9c07a9cadf1049ee82637f7b654b8abed0723d588bf

                SHA512

                391a1f5954e7fafc7dfd5809ab4a14a0980ee6d93cb78389c7da799f25235d5ab50610e6f6eefc8787ef9ee4c7ab80e779c5a95b3bb5dd66630d4d3a2525c581

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k2927516.exe
                Filesize

                21KB

                MD5

                93a0d70a8f9ea7c20d5c8550ee6fc78b

                SHA1

                34efd01b5d9872ded4e20f1bc4947cac6110fbe1

                SHA256

                79d68ee2bb0d35d7d5cfe9c07a9cadf1049ee82637f7b654b8abed0723d588bf

                SHA512

                391a1f5954e7fafc7dfd5809ab4a14a0980ee6d93cb78389c7da799f25235d5ab50610e6f6eefc8787ef9ee4c7ab80e779c5a95b3bb5dd66630d4d3a2525c581

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
                Filesize

                841KB

                MD5

                b54bf5a8aab5fe654c06a0c29952f92e

                SHA1

                5da6940ca428f9ba8e18374b58421869ea1be36f

                SHA256

                bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79

                SHA512

                41eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
                Filesize

                841KB

                MD5

                b54bf5a8aab5fe654c06a0c29952f92e

                SHA1

                5da6940ca428f9ba8e18374b58421869ea1be36f

                SHA256

                bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79

                SHA512

                41eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0313835.exe
                Filesize

                413KB

                MD5

                c1763b7baff1b387292def6d8364ca66

                SHA1

                07ad4f036c9448ef016d88d7c9312c08869e87ef

                SHA256

                5769b13c57bd6e6f2d53d9663e244e50fdb5d87e804a2f3f9e109adaf42c2afa

                SHA512

                40faa52872a925bd4e1d7c102fa9bec040c612001ff5b6829ad51fca637b36e75e4065a5e23774bd2bd0fd132562e7a51ed6c943429b6cc03c380c95ded20a2b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j0313835.exe
                Filesize

                413KB

                MD5

                c1763b7baff1b387292def6d8364ca66

                SHA1

                07ad4f036c9448ef016d88d7c9312c08869e87ef

                SHA256

                5769b13c57bd6e6f2d53d9663e244e50fdb5d87e804a2f3f9e109adaf42c2afa

                SHA512

                40faa52872a925bd4e1d7c102fa9bec040c612001ff5b6829ad51fca637b36e75e4065a5e23774bd2bd0fd132562e7a51ed6c943429b6cc03c380c95ded20a2b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
                Filesize

                563KB

                MD5

                801b230430206d35a19eb6159b99fd3f

                SHA1

                1f129c9f4dad72d64f209b29fd9ac7c66d32dca1

                SHA256

                562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c

                SHA512

                c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
                Filesize

                563KB

                MD5

                801b230430206d35a19eb6159b99fd3f

                SHA1

                1f129c9f4dad72d64f209b29fd9ac7c66d32dca1

                SHA256

                562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c

                SHA512

                c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9774157.exe
                Filesize

                140KB

                MD5

                a5168bb02ed7522f403384f5e22a03b7

                SHA1

                93e359c20240e9776862c205d5aadd1e3b31de7a

                SHA256

                55cf85cc1fe8f86ffeae39df457eaa39891f544c14aa6e957283c8e77b7f0259

                SHA512

                dcdfdfeb75d596e308069536f3043374a062304864fb54c8f13ff6b216d23f0dd6672e41bbec3cd2b7876032d3a45081f303e09fcdf210e0671a06ee16bab54c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9774157.exe
                Filesize

                140KB

                MD5

                a5168bb02ed7522f403384f5e22a03b7

                SHA1

                93e359c20240e9776862c205d5aadd1e3b31de7a

                SHA256

                55cf85cc1fe8f86ffeae39df457eaa39891f544c14aa6e957283c8e77b7f0259

                SHA512

                dcdfdfeb75d596e308069536f3043374a062304864fb54c8f13ff6b216d23f0dd6672e41bbec3cd2b7876032d3a45081f303e09fcdf210e0671a06ee16bab54c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
                Filesize

                397KB

                MD5

                150d459075404075f0dbbcada4949fdd

                SHA1

                f846c30432e6a3454e2607f4aaaed2bf6ba3b222

                SHA256

                d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2

                SHA512

                4207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
                Filesize

                397KB

                MD5

                150d459075404075f0dbbcada4949fdd

                SHA1

                f846c30432e6a3454e2607f4aaaed2bf6ba3b222

                SHA256

                d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2

                SHA512

                4207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
                Filesize

                379KB

                MD5

                c9b33bbac4f5be1992248a0d60b2bec8

                SHA1

                8816fd1e3ed09fccc35d7e8dd908966726cc50b4

                SHA256

                de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

                SHA512

                1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
                Filesize

                379KB

                MD5

                c9b33bbac4f5be1992248a0d60b2bec8

                SHA1

                8816fd1e3ed09fccc35d7e8dd908966726cc50b4

                SHA256

                de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

                SHA512

                1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5823821.exe
                Filesize

                174KB

                MD5

                2ee3248753b6d87659573feff0d956aa

                SHA1

                877f3db2d93c3cc020bf85274b5ddfdc1183d864

                SHA256

                6f43179b1514e490b060f87f11726da0067077797f04e9078084cabaa09d3327

                SHA512

                fb64b0335b47521a383cd8fd17bdae76b97777edd2253dc83971ada2d05fb6a70198ce88eaa4f36cf6daaab9e4a5216c52b36ad8be4d5a53d7728877d66ee007

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5823821.exe
                Filesize

                174KB

                MD5

                2ee3248753b6d87659573feff0d956aa

                SHA1

                877f3db2d93c3cc020bf85274b5ddfdc1183d864

                SHA256

                6f43179b1514e490b060f87f11726da0067077797f04e9078084cabaa09d3327

                SHA512

                fb64b0335b47521a383cd8fd17bdae76b97777edd2253dc83971ada2d05fb6a70198ce88eaa4f36cf6daaab9e4a5216c52b36ad8be4d5a53d7728877d66ee007

              • memory/8-57-0x0000000004E10000-0x0000000004E5C000-memory.dmp
                Filesize

                304KB

              • memory/8-55-0x0000000004D60000-0x0000000004D72000-memory.dmp
                Filesize

                72KB

              • memory/8-56-0x0000000004DC0000-0x0000000004DFC000-memory.dmp
                Filesize

                240KB

              • memory/8-53-0x0000000004FA0000-0x00000000050AA000-memory.dmp
                Filesize

                1.0MB

              • memory/8-58-0x0000000004D20000-0x0000000004D30000-memory.dmp
                Filesize

                64KB

              • memory/8-45-0x0000000000400000-0x0000000000430000-memory.dmp
                Filesize

                192KB

              • memory/8-46-0x00000000745A0000-0x0000000074D50000-memory.dmp
                Filesize

                7.7MB

              • memory/8-47-0x00000000010F0000-0x00000000010F6000-memory.dmp
                Filesize

                24KB

              • memory/8-48-0x00000000745A0000-0x0000000074D50000-memory.dmp
                Filesize

                7.7MB

              • memory/8-54-0x0000000004D20000-0x0000000004D30000-memory.dmp
                Filesize

                64KB

              • memory/8-52-0x0000000005490000-0x0000000005AA8000-memory.dmp
                Filesize

                6.1MB

              • memory/1672-38-0x0000000074A40000-0x00000000751F0000-memory.dmp
                Filesize

                7.7MB

              • memory/1672-37-0x0000000000310000-0x0000000000340000-memory.dmp
                Filesize

                192KB

              • memory/1672-36-0x0000000074A40000-0x00000000751F0000-memory.dmp
                Filesize

                7.7MB

              • memory/4976-32-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/4976-30-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/4976-29-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB

              • memory/4976-28-0x0000000000400000-0x0000000000428000-memory.dmp
                Filesize

                160KB