Analysis

  • max time kernel
    155s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 14:16

General

  • Target

    744fdc798d950d8d4b890617c67c27a48b2fe5cb7cd61b8d09a683c53577f453.exe

  • Size

    1.3MB

  • MD5

    923dfe57fbdd399a2dca8efd588b4804

  • SHA1

    1dc2d17f48573d28904324fc221e1c82c6ae13d2

  • SHA256

    744fdc798d950d8d4b890617c67c27a48b2fe5cb7cd61b8d09a683c53577f453

  • SHA512

    9c4201d68c6676ddca5d375eea13fa337c82eb9c229a4cc46499ba170a3b23fa8f9c75661ec316576325d7f8efe21879357dfc94cb75f2e07aa13dd744c4ddf2

  • SSDEEP

    24576:aykCKpllsq0QZ7mcuF0C93MnBC9qu0Md3tjr99RpHU5edKtXUDFDu5LQkZa++P:hkCK/lsqDdFC3UKj0UJ9zFUTeDu5LQkz

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\744fdc798d950d8d4b890617c67c27a48b2fe5cb7cd61b8d09a683c53577f453.exe
    "C:\Users\Admin\AppData\Local\Temp\744fdc798d950d8d4b890617c67c27a48b2fe5cb7cd61b8d09a683c53577f453.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3500
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3376
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1316
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2100
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:3208
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1492
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 552
                    8⤵
                    • Program crash
                    PID:4292
                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b3704290.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b3704290.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3856
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                      PID:1628
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 540
                        9⤵
                        • Program crash
                        PID:1336
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 568
                      8⤵
                      • Program crash
                      PID:928
                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c0818497.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c0818497.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4880
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2364
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 552
                      7⤵
                      • Program crash
                      PID:3252
                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6746569.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6746569.exe
                  5⤵
                  • Executes dropped EXE
                  PID:3824
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4365860.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4365860.exe
                4⤵
                • Executes dropped EXE
                PID:1688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2100 -ip 2100
          1⤵
            PID:2260
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3856 -ip 3856
            1⤵
              PID:3700
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1628 -ip 1628
              1⤵
                PID:700
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4880 -ip 4880
                1⤵
                  PID:1744

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe

                  Filesize

                  1.2MB

                  MD5

                  4ce4cacf15ae258c734ed57d07fbe62a

                  SHA1

                  c117217ebfaddf59b89daa018bb3ec9e675fc303

                  SHA256

                  e1eef62c9c8c6fca83edb9439fb852b6b07c368bc28d0710a9a540084c599c83

                  SHA512

                  8864bfa1ae6ea18a577ac1266f458158d15c5d481f8ec7d25b1bde280f508549a5170403e6718ef2c9cea5cb92db43dc3024ddeb95afc012513332dd826ebd69

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe

                  Filesize

                  1.2MB

                  MD5

                  4ce4cacf15ae258c734ed57d07fbe62a

                  SHA1

                  c117217ebfaddf59b89daa018bb3ec9e675fc303

                  SHA256

                  e1eef62c9c8c6fca83edb9439fb852b6b07c368bc28d0710a9a540084c599c83

                  SHA512

                  8864bfa1ae6ea18a577ac1266f458158d15c5d481f8ec7d25b1bde280f508549a5170403e6718ef2c9cea5cb92db43dc3024ddeb95afc012513332dd826ebd69

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe

                  Filesize

                  941KB

                  MD5

                  2b88d24314b148930805f36174128fb4

                  SHA1

                  d4812d572f4323bd710fdfcac72bfe6256bc085e

                  SHA256

                  24adce888b55b7ac8f65892af26f367f642db4b20725d8a4597f08db1c74ad88

                  SHA512

                  5a3141b7f0fc68b978ca61b475fcf34151afd7cdf08d38dee5a5adaea44a114a3b56ee3b3f222cabd45f74ccf3263c508f1bf6046cda507eb7122a5fe64f30c8

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe

                  Filesize

                  941KB

                  MD5

                  2b88d24314b148930805f36174128fb4

                  SHA1

                  d4812d572f4323bd710fdfcac72bfe6256bc085e

                  SHA256

                  24adce888b55b7ac8f65892af26f367f642db4b20725d8a4597f08db1c74ad88

                  SHA512

                  5a3141b7f0fc68b978ca61b475fcf34151afd7cdf08d38dee5a5adaea44a114a3b56ee3b3f222cabd45f74ccf3263c508f1bf6046cda507eb7122a5fe64f30c8

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4365860.exe

                  Filesize

                  174KB

                  MD5

                  15b5eebd7203ea5839b44fc1738ce0e5

                  SHA1

                  fcf88bd9ff23e8a1c572c0ff5679962804a5bd59

                  SHA256

                  ed62d54948fbb5e810359a407046a8a9e33d4efaa04ef2fb8f4a71f2073a5bfc

                  SHA512

                  287a88bcd83ce95ef60609e12aaeeb5fa93203f16922dce94f358ddc8f101216a35c88d018a76ab23c484dbeeac5d3b5ca2ab673dce275778724ae8b3f831340

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4365860.exe

                  Filesize

                  174KB

                  MD5

                  15b5eebd7203ea5839b44fc1738ce0e5

                  SHA1

                  fcf88bd9ff23e8a1c572c0ff5679962804a5bd59

                  SHA256

                  ed62d54948fbb5e810359a407046a8a9e33d4efaa04ef2fb8f4a71f2073a5bfc

                  SHA512

                  287a88bcd83ce95ef60609e12aaeeb5fa93203f16922dce94f358ddc8f101216a35c88d018a76ab23c484dbeeac5d3b5ca2ab673dce275778724ae8b3f831340

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe

                  Filesize

                  784KB

                  MD5

                  ed6b949ebe6d61b35dbe5b435f092600

                  SHA1

                  af7ec8e48892318c6c2ffcc2e1f74f520e8560c8

                  SHA256

                  c7dca1aea4182f8937e262beca0b8a6f9c1755c26c868963c801e697f86974a1

                  SHA512

                  703f90aed73337f030af8e5e503739d4a1f2766553d2ed86f281c3ef7d8cecde0f929fc9352d0630f4271297d215331a31a9834060a8973ab1d35c6deb4da476

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe

                  Filesize

                  784KB

                  MD5

                  ed6b949ebe6d61b35dbe5b435f092600

                  SHA1

                  af7ec8e48892318c6c2ffcc2e1f74f520e8560c8

                  SHA256

                  c7dca1aea4182f8937e262beca0b8a6f9c1755c26c868963c801e697f86974a1

                  SHA512

                  703f90aed73337f030af8e5e503739d4a1f2766553d2ed86f281c3ef7d8cecde0f929fc9352d0630f4271297d215331a31a9834060a8973ab1d35c6deb4da476

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6746569.exe

                  Filesize

                  140KB

                  MD5

                  664e0c017478a4bfb25dc2639c759dbd

                  SHA1

                  ebb618f84cffd5a1fc2e45e3b401db858383065a

                  SHA256

                  24af596abaf3fe3f3c3189970bd110e0aa325e8c8d88db1df36815175aff14b0

                  SHA512

                  bb21c6e822b53a84ca7610e446c866b740c10f35ff5848530f7f51348c9045d1d94c8159330ef56245e883e8a3581427a2d6a24d03f2cae0f61372f36efe546c

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6746569.exe

                  Filesize

                  140KB

                  MD5

                  664e0c017478a4bfb25dc2639c759dbd

                  SHA1

                  ebb618f84cffd5a1fc2e45e3b401db858383065a

                  SHA256

                  24af596abaf3fe3f3c3189970bd110e0aa325e8c8d88db1df36815175aff14b0

                  SHA512

                  bb21c6e822b53a84ca7610e446c866b740c10f35ff5848530f7f51348c9045d1d94c8159330ef56245e883e8a3581427a2d6a24d03f2cae0f61372f36efe546c

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe

                  Filesize

                  618KB

                  MD5

                  c0f7f27d18ba9f87c10fc5c4ea5f9f47

                  SHA1

                  46948b7b4dd3b62360a029b37b1b2bccd61f4312

                  SHA256

                  367032d528c98749eeb1b0bf971edee25814de0f85dae196aebf2c4156de4538

                  SHA512

                  52026713ffcc510dfdcb6cb5f7e8e125adc2d4c4999d9fffea0f0e9f2a24f3fc360143a2991cc3d4cb3207f06c83c793f7f363179e6845811cea15762d028b61

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe

                  Filesize

                  618KB

                  MD5

                  c0f7f27d18ba9f87c10fc5c4ea5f9f47

                  SHA1

                  46948b7b4dd3b62360a029b37b1b2bccd61f4312

                  SHA256

                  367032d528c98749eeb1b0bf971edee25814de0f85dae196aebf2c4156de4538

                  SHA512

                  52026713ffcc510dfdcb6cb5f7e8e125adc2d4c4999d9fffea0f0e9f2a24f3fc360143a2991cc3d4cb3207f06c83c793f7f363179e6845811cea15762d028b61

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c0818497.exe

                  Filesize

                  398KB

                  MD5

                  f16d0542842f9e5224f9af082cb147cb

                  SHA1

                  30c5426b0469d96cf624437fd9f542c648ef9872

                  SHA256

                  03a93c718fb4f4bdfe6a6012e018961cafae86aafaeb4552e52c8f457f825a2c

                  SHA512

                  786f90335d794150a97c327ddb115616cb21006302070d2e774181ffabfb6e6244bddcde8c908e0f6012de10506bac0a226804651d879b18033309d595836bcb

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c0818497.exe

                  Filesize

                  398KB

                  MD5

                  f16d0542842f9e5224f9af082cb147cb

                  SHA1

                  30c5426b0469d96cf624437fd9f542c648ef9872

                  SHA256

                  03a93c718fb4f4bdfe6a6012e018961cafae86aafaeb4552e52c8f457f825a2c

                  SHA512

                  786f90335d794150a97c327ddb115616cb21006302070d2e774181ffabfb6e6244bddcde8c908e0f6012de10506bac0a226804651d879b18033309d595836bcb

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe

                  Filesize

                  347KB

                  MD5

                  05d16552e37c455cdf587d8a2587da08

                  SHA1

                  442c2d85b11db4f10147ffe7166e4a7e7582b2ca

                  SHA256

                  820e0ea831012d145c2f73176531306c70b58713318e89ab3c3678f811ffe2fa

                  SHA512

                  8c6b58e681ac2e9ff0f3794f491dac7d35a542d6da5c9289f6c0f142f62111c60c1c181241076c8fd875f91b50e3055cc175e4d4974aceeda676d61b0329954c

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe

                  Filesize

                  347KB

                  MD5

                  05d16552e37c455cdf587d8a2587da08

                  SHA1

                  442c2d85b11db4f10147ffe7166e4a7e7582b2ca

                  SHA256

                  820e0ea831012d145c2f73176531306c70b58713318e89ab3c3678f811ffe2fa

                  SHA512

                  8c6b58e681ac2e9ff0f3794f491dac7d35a542d6da5c9289f6c0f142f62111c60c1c181241076c8fd875f91b50e3055cc175e4d4974aceeda676d61b0329954c

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

                  Filesize

                  235KB

                  MD5

                  d17580aaa4c373d6373981bc1a18956e

                  SHA1

                  75b5a52116e810d8aa7d92caad4de8aba4a188a8

                  SHA256

                  3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

                  SHA512

                  64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

                  Filesize

                  235KB

                  MD5

                  d17580aaa4c373d6373981bc1a18956e

                  SHA1

                  75b5a52116e810d8aa7d92caad4de8aba4a188a8

                  SHA256

                  3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

                  SHA512

                  64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b3704290.exe

                  Filesize

                  364KB

                  MD5

                  0013ad5be0f71433e6b50820f6b543f7

                  SHA1

                  ee156e92d2dbf2fe4240e0fbc34e9cda48667029

                  SHA256

                  57c4f840b714359f265a89965518bf5baf79f0a9a4ddc379201057773bc2497c

                  SHA512

                  91efbbd055bc092fe2e529f05eb53da79eb697f104d349e8fae6ae62c37a96ed5c0b03e1b3f0e74c67dee27d40274b5e82b0ffb0663b23130960ea37895dfe67

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b3704290.exe

                  Filesize

                  364KB

                  MD5

                  0013ad5be0f71433e6b50820f6b543f7

                  SHA1

                  ee156e92d2dbf2fe4240e0fbc34e9cda48667029

                  SHA256

                  57c4f840b714359f265a89965518bf5baf79f0a9a4ddc379201057773bc2497c

                  SHA512

                  91efbbd055bc092fe2e529f05eb53da79eb697f104d349e8fae6ae62c37a96ed5c0b03e1b3f0e74c67dee27d40274b5e82b0ffb0663b23130960ea37895dfe67

                • memory/1492-42-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB

                • memory/1492-61-0x00000000742F0000-0x0000000074AA0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1492-63-0x00000000742F0000-0x0000000074AA0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1492-43-0x00000000742F0000-0x0000000074AA0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1628-47-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1628-51-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1628-49-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1628-48-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1688-79-0x00000000742F0000-0x0000000074AA0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1688-80-0x00000000056B0000-0x00000000056C0000-memory.dmp

                  Filesize

                  64KB

                • memory/1688-77-0x00000000056B0000-0x00000000056C0000-memory.dmp

                  Filesize

                  64KB

                • memory/1688-76-0x0000000007B40000-0x0000000007B46000-memory.dmp

                  Filesize

                  24KB

                • memory/1688-75-0x00000000742F0000-0x0000000074AA0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1688-74-0x0000000000E90000-0x0000000000EC0000-memory.dmp

                  Filesize

                  192KB

                • memory/2364-55-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/2364-70-0x0000000005730000-0x000000000577C000-memory.dmp

                  Filesize

                  304KB

                • memory/2364-69-0x00000000056F0000-0x000000000572C000-memory.dmp

                  Filesize

                  240KB

                • memory/2364-67-0x00000000054A0000-0x00000000054B0000-memory.dmp

                  Filesize

                  64KB

                • memory/2364-68-0x0000000005480000-0x0000000005492000-memory.dmp

                  Filesize

                  72KB

                • memory/2364-66-0x00000000057C0000-0x00000000058CA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/2364-65-0x00000000742F0000-0x0000000074AA0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2364-64-0x0000000005CD0000-0x00000000062E8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/2364-78-0x00000000054A0000-0x00000000054B0000-memory.dmp

                  Filesize

                  64KB

                • memory/2364-57-0x0000000001350000-0x0000000001356000-memory.dmp

                  Filesize

                  24KB

                • memory/2364-56-0x00000000742F0000-0x0000000074AA0000-memory.dmp

                  Filesize

                  7.7MB