Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 19:23

General

  • Target

    49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe

  • Size

    930KB

  • MD5

    dee317ba76524501164b8171c6071f12

  • SHA1

    6844cc3a1b9946ac1003b7b1acd324436d0f6591

  • SHA256

    49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402

  • SHA512

    b16403778a6b077dc41365026375c55db52f3f77b5347214ca26c31c2eb2597cddda2c1c8722970e8db63d8b749bdcede78e6dae49e86234c78ab112119723ab

  • SSDEEP

    12288:CMr+y90cuna7bguPyLi3yQZOMHQYuH/YzWAsQYyX1dIlVms2tpLBaxNgBa6eT+00:Ay9KaHgQoi3yXZYs/aWoleykzoXmI

Malware Config

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe
    "C:\Users\Admin\AppData\Local\Temp\49fe6e8d1f852595ba351774821d8189726a5361a40c06aee9588dfa0f49f402.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7285651.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7285651.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3213608.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3213608.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3752
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8826957.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8826957.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3524
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5911810.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5911810.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3544
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:5064
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 540
                  7⤵
                  • Program crash
                  PID:4992
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 556
                6⤵
                • Program crash
                PID:2056
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3343260.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3343260.exe
              5⤵
              • Executes dropped EXE
              PID:1660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5064 -ip 5064
      1⤵
        PID:3444
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3544 -ip 3544
        1⤵
          PID:1196

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7285651.exe

          Filesize

          828KB

          MD5

          42109192c04a35fb0c05b4795115c75e

          SHA1

          6904ea1135f46027bf3f3bb41365d38fac796872

          SHA256

          3a16fc0495736fe867a800c4d5ccb1abd68b1ab2e8f3e281565227401432616a

          SHA512

          80d0da6f8a60ce1a17951912ce33000d6d60ff1e0023a8678f8feef269a9487977a9442bd3063f80e7a11789e7791951d053aca8a2426e8d2f231c5773f219a5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7285651.exe

          Filesize

          828KB

          MD5

          42109192c04a35fb0c05b4795115c75e

          SHA1

          6904ea1135f46027bf3f3bb41365d38fac796872

          SHA256

          3a16fc0495736fe867a800c4d5ccb1abd68b1ab2e8f3e281565227401432616a

          SHA512

          80d0da6f8a60ce1a17951912ce33000d6d60ff1e0023a8678f8feef269a9487977a9442bd3063f80e7a11789e7791951d053aca8a2426e8d2f231c5773f219a5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3213608.exe

          Filesize

          556KB

          MD5

          d3fd8597deb48597abff0561760c0de7

          SHA1

          714a957e0f35d55822e9f6df201a36e7fce8dc2b

          SHA256

          223b616c22fe3459a67ef99c0fdac623798e08272b85d8a2b48b12b9c7636e81

          SHA512

          1f42fba78995b80adc188bdc5d23406dca97b20306ecca12b44e58d30a6ad50849b591161bd2d3ce6e045d5ac5318ebe4ddd51145d4b0d79d50bcc3598f51988

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3213608.exe

          Filesize

          556KB

          MD5

          d3fd8597deb48597abff0561760c0de7

          SHA1

          714a957e0f35d55822e9f6df201a36e7fce8dc2b

          SHA256

          223b616c22fe3459a67ef99c0fdac623798e08272b85d8a2b48b12b9c7636e81

          SHA512

          1f42fba78995b80adc188bdc5d23406dca97b20306ecca12b44e58d30a6ad50849b591161bd2d3ce6e045d5ac5318ebe4ddd51145d4b0d79d50bcc3598f51988

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8826957.exe

          Filesize

          390KB

          MD5

          7e116a8f66f508374e056f16f855bdb5

          SHA1

          9698b5d7dd5c0feda7ef1badf3a3a12fcb0f235f

          SHA256

          97ebc1f6f7e35a21cd98a12ff15febf17683dea2aad02879961d8f89b6b6bd0e

          SHA512

          ca217892d36fc914fe03c42684ab3734f3f47fdf62a85e92901df688a5434c6a54b0d4153b7ee77c150cf073d87b308bfa5b1dbf96b8783cacfaff83d7ff062f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8826957.exe

          Filesize

          390KB

          MD5

          7e116a8f66f508374e056f16f855bdb5

          SHA1

          9698b5d7dd5c0feda7ef1badf3a3a12fcb0f235f

          SHA256

          97ebc1f6f7e35a21cd98a12ff15febf17683dea2aad02879961d8f89b6b6bd0e

          SHA512

          ca217892d36fc914fe03c42684ab3734f3f47fdf62a85e92901df688a5434c6a54b0d4153b7ee77c150cf073d87b308bfa5b1dbf96b8783cacfaff83d7ff062f

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5911810.exe

          Filesize

          364KB

          MD5

          13fc2bd4ae8d777ef3c754bd0eb8ae31

          SHA1

          0ffb7a8514546c537ab7ccacca3a2fe2ebe6942e

          SHA256

          b576110c694958a1c4b84c30ed356a57b79ca8af756afe64c308eec1419efab1

          SHA512

          b677500e47cf0c52f18fb2797ede8e6317c24d5040fee35d9b774ae21c236801fa446bf1a021add5ca2fed17ed56e7e0653b802bbf2c70c6157508cacaa00813

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5911810.exe

          Filesize

          364KB

          MD5

          13fc2bd4ae8d777ef3c754bd0eb8ae31

          SHA1

          0ffb7a8514546c537ab7ccacca3a2fe2ebe6942e

          SHA256

          b576110c694958a1c4b84c30ed356a57b79ca8af756afe64c308eec1419efab1

          SHA512

          b677500e47cf0c52f18fb2797ede8e6317c24d5040fee35d9b774ae21c236801fa446bf1a021add5ca2fed17ed56e7e0653b802bbf2c70c6157508cacaa00813

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3343260.exe

          Filesize

          173KB

          MD5

          f41fd151a463884725de69fd00567982

          SHA1

          e8a6db2902b025f3e8cc843ff1ec7f723520e398

          SHA256

          90b965ecfd867cec9727a55aac34e7b7006febc36bda129608b75f057eb63e88

          SHA512

          64ce0edac188309d9a56d4885b62aba53fdb994b11707ad378b1d2045239d3ddd71ddae8a29cea60301620c1f0748acc2007b5c02d913be5fc10a8995c419c8d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3343260.exe

          Filesize

          173KB

          MD5

          f41fd151a463884725de69fd00567982

          SHA1

          e8a6db2902b025f3e8cc843ff1ec7f723520e398

          SHA256

          90b965ecfd867cec9727a55aac34e7b7006febc36bda129608b75f057eb63e88

          SHA512

          64ce0edac188309d9a56d4885b62aba53fdb994b11707ad378b1d2045239d3ddd71ddae8a29cea60301620c1f0748acc2007b5c02d913be5fc10a8995c419c8d

        • memory/1660-39-0x0000000005B50000-0x0000000006168000-memory.dmp

          Filesize

          6.1MB

        • memory/1660-41-0x00000000055B0000-0x00000000055C2000-memory.dmp

          Filesize

          72KB

        • memory/1660-46-0x0000000005420000-0x0000000005430000-memory.dmp

          Filesize

          64KB

        • memory/1660-45-0x0000000074000000-0x00000000747B0000-memory.dmp

          Filesize

          7.7MB

        • memory/1660-37-0x0000000074000000-0x00000000747B0000-memory.dmp

          Filesize

          7.7MB

        • memory/1660-36-0x0000000000AE0000-0x0000000000B10000-memory.dmp

          Filesize

          192KB

        • memory/1660-44-0x0000000005780000-0x00000000057CC000-memory.dmp

          Filesize

          304KB

        • memory/1660-40-0x0000000005670000-0x000000000577A000-memory.dmp

          Filesize

          1.0MB

        • memory/1660-38-0x0000000005400000-0x0000000005406000-memory.dmp

          Filesize

          24KB

        • memory/1660-42-0x0000000005420000-0x0000000005430000-memory.dmp

          Filesize

          64KB

        • memory/1660-43-0x0000000005610000-0x000000000564C000-memory.dmp

          Filesize

          240KB

        • memory/5064-28-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/5064-32-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/5064-30-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/5064-29-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB