Analysis

  • max time kernel
    140s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 14:22

General

  • Target

    d95c6d2b0c1dd1f95ea5810e4a0bfa0fbfa5a626a26bdf64907b5b26654bbf7f.exe

  • Size

    1.3MB

  • MD5

    5e2c32f1f985780b05f8e27a12974695

  • SHA1

    f773e2e9a56b8011cd4606e1593da3d0c2ac70ca

  • SHA256

    d95c6d2b0c1dd1f95ea5810e4a0bfa0fbfa5a626a26bdf64907b5b26654bbf7f

  • SHA512

    ac4fe96551845033f0d800a2dcb1177426e74322309a47d5bab441d1d205e710d6b4b60ed8309409b5c45d77c403ce32c9427fd64d56d2f068df219430d8f0d8

  • SSDEEP

    24576:myEPmuKRD+EPw3NpjZI3CN3PEEjIdTYsupa/lvKTXAdl8l3hfDh6T8tOcpEIHvl:1AmuaCZ3vjZI3CZcNJYGlvKTwd+1hjtn

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d95c6d2b0c1dd1f95ea5810e4a0bfa0fbfa5a626a26bdf64907b5b26654bbf7f.exe
    "C:\Users\Admin\AppData\Local\Temp\d95c6d2b0c1dd1f95ea5810e4a0bfa0fbfa5a626a26bdf64907b5b26654bbf7f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7774545.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7774545.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3670612.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3670612.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3496705.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3496705.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8005165.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8005165.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:5068
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9380555.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9380555.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:324
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7028297.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7028297.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:856
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2204
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 592
                  8⤵
                  • Program crash
                  PID:1492
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b0119640.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b0119640.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:768
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:1112
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 192
                      9⤵
                      • Program crash
                      PID:3296
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 584
                    8⤵
                    • Program crash
                    PID:4552
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c7046971.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c7046971.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3544
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:1684
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 568
                    7⤵
                    • Program crash
                    PID:2608
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2218771.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2218771.exe
                5⤵
                • Executes dropped EXE
                PID:492
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4870070.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4870070.exe
              4⤵
              • Executes dropped EXE
              PID:4748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 856 -ip 856
        1⤵
          PID:3400
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 768 -ip 768
          1⤵
            PID:1888
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1112 -ip 1112
            1⤵
              PID:4992
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3544 -ip 3544
              1⤵
                PID:4132

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7774545.exe

                Filesize

                1.2MB

                MD5

                3a9e98fdd979ad9b8d4ed07d3fa5922b

                SHA1

                4f7c4bb010d20609ffcd0423efe8d5d1b16d8f06

                SHA256

                6bc2d07cad5fa0f33da01724cc2a776b44aed292ce4d2262ab5f0e6069f8b4e3

                SHA512

                d1ca3eae5074b7597d8defe68210d16f6d3fbe608a492516e2e3097bd56499efaf855a0a178ee345fa9d7f063109c6a6810232b81862d4575ea05baea60dc2cf

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7774545.exe

                Filesize

                1.2MB

                MD5

                3a9e98fdd979ad9b8d4ed07d3fa5922b

                SHA1

                4f7c4bb010d20609ffcd0423efe8d5d1b16d8f06

                SHA256

                6bc2d07cad5fa0f33da01724cc2a776b44aed292ce4d2262ab5f0e6069f8b4e3

                SHA512

                d1ca3eae5074b7597d8defe68210d16f6d3fbe608a492516e2e3097bd56499efaf855a0a178ee345fa9d7f063109c6a6810232b81862d4575ea05baea60dc2cf

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3670612.exe

                Filesize

                953KB

                MD5

                93458ea6f5f4ffa0a036c50f6a620063

                SHA1

                a6af3ae532ae57855c44d4818e03648fb986cfaf

                SHA256

                3245891e3a4e574aa1cf5d00fe1ccbbeaba19b8a6fdf2ee8201aa04b71ad5feb

                SHA512

                dc925e0cd273462ddcd39e66fd6c8f92f44cf87c121a1034b48492c16c654007ce81515136105fa2cc47aa3f88724b2ddf98051ebaab666db6f398a0ac70d8ec

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3670612.exe

                Filesize

                953KB

                MD5

                93458ea6f5f4ffa0a036c50f6a620063

                SHA1

                a6af3ae532ae57855c44d4818e03648fb986cfaf

                SHA256

                3245891e3a4e574aa1cf5d00fe1ccbbeaba19b8a6fdf2ee8201aa04b71ad5feb

                SHA512

                dc925e0cd273462ddcd39e66fd6c8f92f44cf87c121a1034b48492c16c654007ce81515136105fa2cc47aa3f88724b2ddf98051ebaab666db6f398a0ac70d8ec

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4870070.exe

                Filesize

                174KB

                MD5

                664d75b643891b3cffef3c56f9c4e4c5

                SHA1

                6515a583048425b6da5c3069e9f31d0b9571f63c

                SHA256

                31f70c930b79c3676e69ea7ca76a2c22f1aff2fd9ece0d6bcfed7832dfb05479

                SHA512

                d2f5d9747d429fc0d34aab1062b8c2219d82a1fe558067f49327df8e5fe3211380ad1f218eb53f167ab8b1a3348b34c5260875547ba40aa4945e61027d08a3ab

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4870070.exe

                Filesize

                174KB

                MD5

                664d75b643891b3cffef3c56f9c4e4c5

                SHA1

                6515a583048425b6da5c3069e9f31d0b9571f63c

                SHA256

                31f70c930b79c3676e69ea7ca76a2c22f1aff2fd9ece0d6bcfed7832dfb05479

                SHA512

                d2f5d9747d429fc0d34aab1062b8c2219d82a1fe558067f49327df8e5fe3211380ad1f218eb53f167ab8b1a3348b34c5260875547ba40aa4945e61027d08a3ab

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3496705.exe

                Filesize

                797KB

                MD5

                44d00c9555c4538623e36028dcefbf6c

                SHA1

                8c934174af6109f8f808deb1ff9c3a3c560f4b3b

                SHA256

                bfdd8d6027d11696b6c5aff1c68451f289bd89b6b3fd6e826c30373db607fbe2

                SHA512

                0dd6345371f9a17e4d0c8adab0f208d27d988d07434ba58980fd027c6df839f44a96bebf66b438840186e349a126ca26f83172bcb9e78869cb50ec9b92cacaf9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3496705.exe

                Filesize

                797KB

                MD5

                44d00c9555c4538623e36028dcefbf6c

                SHA1

                8c934174af6109f8f808deb1ff9c3a3c560f4b3b

                SHA256

                bfdd8d6027d11696b6c5aff1c68451f289bd89b6b3fd6e826c30373db607fbe2

                SHA512

                0dd6345371f9a17e4d0c8adab0f208d27d988d07434ba58980fd027c6df839f44a96bebf66b438840186e349a126ca26f83172bcb9e78869cb50ec9b92cacaf9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2218771.exe

                Filesize

                140KB

                MD5

                188e923f7f21d6df56b426e73fc77b07

                SHA1

                c391ed707a6a0eea455a8283883384a153c9681c

                SHA256

                3b0cd2f65ee130bcc64c7bb5b7d3ce0cc1760a011118500554d50ea9bc408cda

                SHA512

                9bed3944d15cf0b1edb17205f540a167188205cd6da8863821e1dee40b4f1a41edc7e5925d87ae7cff595ad0891157f0b89f4465fbae981a9788a7f2a8c422bd

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2218771.exe

                Filesize

                140KB

                MD5

                188e923f7f21d6df56b426e73fc77b07

                SHA1

                c391ed707a6a0eea455a8283883384a153c9681c

                SHA256

                3b0cd2f65ee130bcc64c7bb5b7d3ce0cc1760a011118500554d50ea9bc408cda

                SHA512

                9bed3944d15cf0b1edb17205f540a167188205cd6da8863821e1dee40b4f1a41edc7e5925d87ae7cff595ad0891157f0b89f4465fbae981a9788a7f2a8c422bd

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8005165.exe

                Filesize

                631KB

                MD5

                52754dc753b7499e8572d65bfcd72680

                SHA1

                05bce1d0335b321a598de9fafe5c713a568ee48c

                SHA256

                fc9d5a1887448ebe0e4f8a93a0adfd53988b0d2a8e28087a1dea79e32d44da87

                SHA512

                12184f515ee249a5649fc3cd75267b2e3d9b9d01225e4e4d1f7e9f1c62d4b3e881e3ccc731ff4286ac3110c1df17eba009f833ce5b25ccbdfa8371347e3c678b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8005165.exe

                Filesize

                631KB

                MD5

                52754dc753b7499e8572d65bfcd72680

                SHA1

                05bce1d0335b321a598de9fafe5c713a568ee48c

                SHA256

                fc9d5a1887448ebe0e4f8a93a0adfd53988b0d2a8e28087a1dea79e32d44da87

                SHA512

                12184f515ee249a5649fc3cd75267b2e3d9b9d01225e4e4d1f7e9f1c62d4b3e881e3ccc731ff4286ac3110c1df17eba009f833ce5b25ccbdfa8371347e3c678b

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c7046971.exe

                Filesize

                413KB

                MD5

                c6d1d0bc30a0e171eb0103b96a87247f

                SHA1

                62671d83efacdb9be5d00fdf0c6e2d2fe5bc4e21

                SHA256

                ae2d6f6511c10f19df4cf68187a6e04e81a722b548a34b373ea3eb7e5874b902

                SHA512

                9966f4c548f7adbe4658be5b347a1ec1dcab4ba33d3e0f0d237df45c6ef83b74cea5fe5d7f923b2ee78c976934b1ad40350cd882df871424562e4df2ac29b43b

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c7046971.exe

                Filesize

                413KB

                MD5

                c6d1d0bc30a0e171eb0103b96a87247f

                SHA1

                62671d83efacdb9be5d00fdf0c6e2d2fe5bc4e21

                SHA256

                ae2d6f6511c10f19df4cf68187a6e04e81a722b548a34b373ea3eb7e5874b902

                SHA512

                9966f4c548f7adbe4658be5b347a1ec1dcab4ba33d3e0f0d237df45c6ef83b74cea5fe5d7f923b2ee78c976934b1ad40350cd882df871424562e4df2ac29b43b

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9380555.exe

                Filesize

                354KB

                MD5

                45259fcd08cc473ef0f912937c8387f2

                SHA1

                043bb27eb6e6f9694ec9c1faf304a2e5d7669856

                SHA256

                1582e35636a8be1354e6abb94949442119ef29debb1ac5c6e370d1bbafdd40c7

                SHA512

                29c3c6c7ea6ec91a298ac06a8d4180499e8d590b422d16c601179c7fcdd189f900529ff6d121e0a5b9ee196c0481cc078971c0e77f368f1bba9d4651636a6dc2

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9380555.exe

                Filesize

                354KB

                MD5

                45259fcd08cc473ef0f912937c8387f2

                SHA1

                043bb27eb6e6f9694ec9c1faf304a2e5d7669856

                SHA256

                1582e35636a8be1354e6abb94949442119ef29debb1ac5c6e370d1bbafdd40c7

                SHA512

                29c3c6c7ea6ec91a298ac06a8d4180499e8d590b422d16c601179c7fcdd189f900529ff6d121e0a5b9ee196c0481cc078971c0e77f368f1bba9d4651636a6dc2

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7028297.exe

                Filesize

                250KB

                MD5

                b12875989fea5154a1c051ff272a59ba

                SHA1

                12c36d4bb9a1e8b208f610c8de37394b45c51b26

                SHA256

                50d6125599f715d4bbfc8f422397b2258aa5cba0f1fc7169b37184912c249038

                SHA512

                4a75fe1e65e578cfbeef8c95a6ff9adf36555761f6dbd7c94b4335801eed53dd873933e2f17cce0c1c8bb4d5d4939bd345d72a5593583f50c5d81bd6a595a989

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7028297.exe

                Filesize

                250KB

                MD5

                b12875989fea5154a1c051ff272a59ba

                SHA1

                12c36d4bb9a1e8b208f610c8de37394b45c51b26

                SHA256

                50d6125599f715d4bbfc8f422397b2258aa5cba0f1fc7169b37184912c249038

                SHA512

                4a75fe1e65e578cfbeef8c95a6ff9adf36555761f6dbd7c94b4335801eed53dd873933e2f17cce0c1c8bb4d5d4939bd345d72a5593583f50c5d81bd6a595a989

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b0119640.exe

                Filesize

                379KB

                MD5

                f5ac218459301f08084af9e1816570b0

                SHA1

                351ca4b88ac355f7ca87425ff457f960619b6782

                SHA256

                00432e830c0241e4dabd0520e10d088881882c2f3891e00fe669c18df775f14a

                SHA512

                331c28dd37547a02a7d6fd66528dc215bacbe1723cacd479d792cda8aed61baf65fa47605b6225a74ea2379fc33195bcb335e220729be405c664102f0c0d6139

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b0119640.exe

                Filesize

                379KB

                MD5

                f5ac218459301f08084af9e1816570b0

                SHA1

                351ca4b88ac355f7ca87425ff457f960619b6782

                SHA256

                00432e830c0241e4dabd0520e10d088881882c2f3891e00fe669c18df775f14a

                SHA512

                331c28dd37547a02a7d6fd66528dc215bacbe1723cacd479d792cda8aed61baf65fa47605b6225a74ea2379fc33195bcb335e220729be405c664102f0c0d6139

              • memory/1112-48-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/1112-49-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/1112-50-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/1112-52-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/1684-73-0x000000000A690000-0x000000000A6A2000-memory.dmp

                Filesize

                72KB

              • memory/1684-77-0x0000000073EB0000-0x0000000074660000-memory.dmp

                Filesize

                7.7MB

              • memory/1684-61-0x00000000010A0000-0x00000000010A6000-memory.dmp

                Filesize

                24KB

              • memory/1684-80-0x00000000050F0000-0x0000000005100000-memory.dmp

                Filesize

                64KB

              • memory/1684-58-0x0000000000400000-0x0000000000430000-memory.dmp

                Filesize

                192KB

              • memory/1684-66-0x000000000ABE0000-0x000000000B1F8000-memory.dmp

                Filesize

                6.1MB

              • memory/1684-78-0x000000000A860000-0x000000000A8AC000-memory.dmp

                Filesize

                304KB

              • memory/1684-60-0x0000000073EB0000-0x0000000074660000-memory.dmp

                Filesize

                7.7MB

              • memory/1684-76-0x000000000A6F0000-0x000000000A72C000-memory.dmp

                Filesize

                240KB

              • memory/1684-74-0x00000000050F0000-0x0000000005100000-memory.dmp

                Filesize

                64KB

              • memory/1684-72-0x000000000A750000-0x000000000A85A000-memory.dmp

                Filesize

                1.0MB

              • memory/2204-44-0x0000000074790000-0x0000000074F40000-memory.dmp

                Filesize

                7.7MB

              • memory/2204-54-0x0000000074790000-0x0000000074F40000-memory.dmp

                Filesize

                7.7MB

              • memory/2204-43-0x0000000074790000-0x0000000074F40000-memory.dmp

                Filesize

                7.7MB

              • memory/2204-42-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/4748-71-0x0000000073EB0000-0x0000000074660000-memory.dmp

                Filesize

                7.7MB

              • memory/4748-70-0x0000000002FD0000-0x0000000002FD6000-memory.dmp

                Filesize

                24KB

              • memory/4748-75-0x0000000005750000-0x0000000005760000-memory.dmp

                Filesize

                64KB

              • memory/4748-69-0x0000000000F70000-0x0000000000FA0000-memory.dmp

                Filesize

                192KB

              • memory/4748-79-0x0000000073EB0000-0x0000000074660000-memory.dmp

                Filesize

                7.7MB

              • memory/4748-81-0x0000000005750000-0x0000000005760000-memory.dmp

                Filesize

                64KB