Analysis

  • max time kernel
    153s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 19:29

General

  • Target

    0e53f45fba52b201be056b639a908b4495e950040017f1e31c9fbd34828aa4f0.exe

  • Size

    1.3MB

  • MD5

    6eafedd22eb1c2dc880b0fb59ecca6b5

  • SHA1

    cb45b2f6032d682561d34c79979cf1a076776f3d

  • SHA256

    0e53f45fba52b201be056b639a908b4495e950040017f1e31c9fbd34828aa4f0

  • SHA512

    cb49fc580d1fca41475f0cc57d424daa2d11420246221b79e8188a6bd55dc1e85bf619a51d06cce7e920dac9d00ee79d27bb41037790cb1c801c0e2ac6b4a7e6

  • SSDEEP

    24576:eyCY0L4UIJMhkv1tGKeOzcQdMmcEYs1WVWLn7mvg8MspUXNPDtY:tx/UhmXGKeOzcQQO1WVUah7wDt

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e53f45fba52b201be056b639a908b4495e950040017f1e31c9fbd34828aa4f0.exe
    "C:\Users\Admin\AppData\Local\Temp\0e53f45fba52b201be056b639a908b4495e950040017f1e31c9fbd34828aa4f0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3244
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:5036
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1292
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2868
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:872
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 552
                  8⤵
                  • Program crash
                  PID:940
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b9425148.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b9425148.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1328
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:2452
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 200
                      9⤵
                      • Program crash
                      PID:2140
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 552
                    8⤵
                    • Program crash
                    PID:4368
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c4560417.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c4560417.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:776
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2444
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:3592
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 572
                      7⤵
                      • Program crash
                      PID:3468
                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d9273632.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d9273632.exe
                  5⤵
                  • Executes dropped EXE
                  PID:2232
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4479598.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4479598.exe
                4⤵
                • Executes dropped EXE
                PID:4632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2868 -ip 2868
          1⤵
            PID:3620
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1328 -ip 1328
            1⤵
              PID:3812
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2452 -ip 2452
              1⤵
                PID:3448
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 776 -ip 776
                1⤵
                  PID:2536

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe

                  Filesize

                  1.2MB

                  MD5

                  a702c1a739ce504a3031fb93b1215113

                  SHA1

                  1c72b2bba610d5a26ac6781e5113ae01cc36a2e4

                  SHA256

                  3f5177b2d1d412742b7d5ccf78e7c90cd3ef84a6d1be30bd795768f7a50789e2

                  SHA512

                  7c26033e935348228e963f07e146c3218ae06e7c795d059dc9756b01334c615964a9efbd60a59a5032489d3c402fe652b9c538f7f3d300f8c13be2848813688f

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe

                  Filesize

                  1.2MB

                  MD5

                  a702c1a739ce504a3031fb93b1215113

                  SHA1

                  1c72b2bba610d5a26ac6781e5113ae01cc36a2e4

                  SHA256

                  3f5177b2d1d412742b7d5ccf78e7c90cd3ef84a6d1be30bd795768f7a50789e2

                  SHA512

                  7c26033e935348228e963f07e146c3218ae06e7c795d059dc9756b01334c615964a9efbd60a59a5032489d3c402fe652b9c538f7f3d300f8c13be2848813688f

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe

                  Filesize

                  941KB

                  MD5

                  5ca1c2c2ccbb115edd89203261d8ea71

                  SHA1

                  d4b95ee33957c27d026bad90c2c4e9965498e716

                  SHA256

                  2f9021704041ee902ca55537d7b5792dc74436558b0453f72d8440264c1bb7bf

                  SHA512

                  b23857d5d9c9b63c7ecc6e947642ebeaf85ccaf75e4e7c490ad930fca3896a81f2e36ca099722317e2fa305ebb9675a4a8c3d5930761abb841d5dd0f5140067d

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe

                  Filesize

                  941KB

                  MD5

                  5ca1c2c2ccbb115edd89203261d8ea71

                  SHA1

                  d4b95ee33957c27d026bad90c2c4e9965498e716

                  SHA256

                  2f9021704041ee902ca55537d7b5792dc74436558b0453f72d8440264c1bb7bf

                  SHA512

                  b23857d5d9c9b63c7ecc6e947642ebeaf85ccaf75e4e7c490ad930fca3896a81f2e36ca099722317e2fa305ebb9675a4a8c3d5930761abb841d5dd0f5140067d

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4479598.exe

                  Filesize

                  173KB

                  MD5

                  bbca1ed950d3384ad1ec1b633c7f9e50

                  SHA1

                  7b2ae804aa15c4b741106f937f776f188d10e15b

                  SHA256

                  955002af56d5d11e6866f827a8dfa6fdb6d047f95c5c743fc27d027fe97fefbe

                  SHA512

                  cd381d212047ab80771d1cb962e9dc16bf1891c47a09b1c1ee1d4487fa1f4efd7059f703ea6910063ced8f906eaa9362a3e12e5c7527d508e2ec824392e7bd4c

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e4479598.exe

                  Filesize

                  173KB

                  MD5

                  bbca1ed950d3384ad1ec1b633c7f9e50

                  SHA1

                  7b2ae804aa15c4b741106f937f776f188d10e15b

                  SHA256

                  955002af56d5d11e6866f827a8dfa6fdb6d047f95c5c743fc27d027fe97fefbe

                  SHA512

                  cd381d212047ab80771d1cb962e9dc16bf1891c47a09b1c1ee1d4487fa1f4efd7059f703ea6910063ced8f906eaa9362a3e12e5c7527d508e2ec824392e7bd4c

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe

                  Filesize

                  784KB

                  MD5

                  57ee8f8d047550c37d32cb4f8691bd2b

                  SHA1

                  c595718640efe4abba7168646effe188eabbafc2

                  SHA256

                  95bda9538d472bf1c549314caae19f9b62893b9b5d18b4f41a73763eea36681f

                  SHA512

                  059e2520b5e1d199d53ea45e0b359fe98dc0636ed8770dce8e2a7c254ab0c4c9db7c9cdce66c7755218f1afe8329d3fbe0abeff071d71ea66cab102d5d853476

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe

                  Filesize

                  784KB

                  MD5

                  57ee8f8d047550c37d32cb4f8691bd2b

                  SHA1

                  c595718640efe4abba7168646effe188eabbafc2

                  SHA256

                  95bda9538d472bf1c549314caae19f9b62893b9b5d18b4f41a73763eea36681f

                  SHA512

                  059e2520b5e1d199d53ea45e0b359fe98dc0636ed8770dce8e2a7c254ab0c4c9db7c9cdce66c7755218f1afe8329d3fbe0abeff071d71ea66cab102d5d853476

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d9273632.exe

                  Filesize

                  140KB

                  MD5

                  bdee45f2c36a4ce13a2c2aab435d8120

                  SHA1

                  477ea59ec302bff25988dddd8a87776e8049dd2a

                  SHA256

                  362a12fe1c709f5f9749084897285e7fa9042a8d222604d3acee77e72b03c569

                  SHA512

                  fcc4d50b635a4a4ab55e644bad2487ad5f540c1efb7a65193e7883f26fe084d25f01ee46a2cef8dd286bcabb00339a6197ee3bd88e7760dabf41237a588416b6

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d9273632.exe

                  Filesize

                  140KB

                  MD5

                  bdee45f2c36a4ce13a2c2aab435d8120

                  SHA1

                  477ea59ec302bff25988dddd8a87776e8049dd2a

                  SHA256

                  362a12fe1c709f5f9749084897285e7fa9042a8d222604d3acee77e72b03c569

                  SHA512

                  fcc4d50b635a4a4ab55e644bad2487ad5f540c1efb7a65193e7883f26fe084d25f01ee46a2cef8dd286bcabb00339a6197ee3bd88e7760dabf41237a588416b6

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe

                  Filesize

                  618KB

                  MD5

                  483a2f9712b2561c6135c8b6ae0837ab

                  SHA1

                  197c6308e3a2be8784d768e40bd8db5b43d1ee5e

                  SHA256

                  23967bf5de910a04002e8c439d9e40155aa793c596d66d0deca310faa6b064e6

                  SHA512

                  99c09b5910535aced445b00bc9ee0c2987ccda4d00b576ed5fb4fcde737476241f2115baa1a6da7b10537020a69f20f16624592e714f0b1e4273cf179b541f8b

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe

                  Filesize

                  618KB

                  MD5

                  483a2f9712b2561c6135c8b6ae0837ab

                  SHA1

                  197c6308e3a2be8784d768e40bd8db5b43d1ee5e

                  SHA256

                  23967bf5de910a04002e8c439d9e40155aa793c596d66d0deca310faa6b064e6

                  SHA512

                  99c09b5910535aced445b00bc9ee0c2987ccda4d00b576ed5fb4fcde737476241f2115baa1a6da7b10537020a69f20f16624592e714f0b1e4273cf179b541f8b

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c4560417.exe

                  Filesize

                  398KB

                  MD5

                  9ca8477f0a645703497e7545873ef7db

                  SHA1

                  830bb05191290f309c94c8e64948794d969e9112

                  SHA256

                  4e81ffebac3ebb71d7592b3f3e072f5410e20c81c790cf306df445be20f8bdb5

                  SHA512

                  4664fa43e41ac41d31b8dc589ff578f3959ade486f7e9b06d668bec386d8ad52989253b9689966e96d540ae2501f78a7809a730d7359c7816dcf7e16333c3af1

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c4560417.exe

                  Filesize

                  398KB

                  MD5

                  9ca8477f0a645703497e7545873ef7db

                  SHA1

                  830bb05191290f309c94c8e64948794d969e9112

                  SHA256

                  4e81ffebac3ebb71d7592b3f3e072f5410e20c81c790cf306df445be20f8bdb5

                  SHA512

                  4664fa43e41ac41d31b8dc589ff578f3959ade486f7e9b06d668bec386d8ad52989253b9689966e96d540ae2501f78a7809a730d7359c7816dcf7e16333c3af1

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe

                  Filesize

                  347KB

                  MD5

                  2f307ad0a14c6d8a8754dd624f0542c7

                  SHA1

                  556ac8bb0ade5471b222994f3a01456d7e7611eb

                  SHA256

                  477e8a18d69b1c9df62c1649da1598e719267a7b51caed601ff908994020f2b3

                  SHA512

                  26fd1ea1e2038846b33c8f2f9a3e9ab8ca5d9dc50904c19965289961868b87a7968c1c216761c0034a35f84bdee64f7509385bd4e4ba71ae3c33400fa5f3fe01

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe

                  Filesize

                  347KB

                  MD5

                  2f307ad0a14c6d8a8754dd624f0542c7

                  SHA1

                  556ac8bb0ade5471b222994f3a01456d7e7611eb

                  SHA256

                  477e8a18d69b1c9df62c1649da1598e719267a7b51caed601ff908994020f2b3

                  SHA512

                  26fd1ea1e2038846b33c8f2f9a3e9ab8ca5d9dc50904c19965289961868b87a7968c1c216761c0034a35f84bdee64f7509385bd4e4ba71ae3c33400fa5f3fe01

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

                  Filesize

                  235KB

                  MD5

                  e0d51230e0bc836a685ba05fdb9f396f

                  SHA1

                  dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

                  SHA256

                  a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

                  SHA512

                  2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

                  Filesize

                  235KB

                  MD5

                  e0d51230e0bc836a685ba05fdb9f396f

                  SHA1

                  dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

                  SHA256

                  a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

                  SHA512

                  2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b9425148.exe

                  Filesize

                  364KB

                  MD5

                  0ab6c55fd0115e650d66183da1507fcd

                  SHA1

                  8aaf7c16f583088c3c7635736eaaea4612d744f5

                  SHA256

                  bdfe0e2f800f0824b821093afda3f744b99d72fbc58619859b3b96c15cb65d11

                  SHA512

                  01f5909f58b9774fe13074fc21b9d446e3d673a307a68eab21a1038b0ffb7a5cd36842c0055448a52d38e7c2a5a491383c983b7dc61f0c2c3ff95068167be103

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b9425148.exe

                  Filesize

                  364KB

                  MD5

                  0ab6c55fd0115e650d66183da1507fcd

                  SHA1

                  8aaf7c16f583088c3c7635736eaaea4612d744f5

                  SHA256

                  bdfe0e2f800f0824b821093afda3f744b99d72fbc58619859b3b96c15cb65d11

                  SHA512

                  01f5909f58b9774fe13074fc21b9d446e3d673a307a68eab21a1038b0ffb7a5cd36842c0055448a52d38e7c2a5a491383c983b7dc61f0c2c3ff95068167be103

                • memory/872-43-0x0000000073C50000-0x0000000074400000-memory.dmp

                  Filesize

                  7.7MB

                • memory/872-71-0x0000000073C50000-0x0000000074400000-memory.dmp

                  Filesize

                  7.7MB

                • memory/872-42-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB

                • memory/872-44-0x0000000073C50000-0x0000000074400000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2452-49-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/2452-52-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/2452-48-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/2452-50-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/3592-57-0x0000000073C50000-0x0000000074400000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3592-73-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

                  Filesize

                  72KB

                • memory/3592-58-0x0000000000FC0000-0x0000000000FC6000-memory.dmp

                  Filesize

                  24KB

                • memory/3592-79-0x0000000004EF0000-0x0000000004F00000-memory.dmp

                  Filesize

                  64KB

                • memory/3592-77-0x0000000073C50000-0x0000000074400000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3592-68-0x0000000005010000-0x000000000511A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/3592-76-0x0000000004F80000-0x0000000004FCC000-memory.dmp

                  Filesize

                  304KB

                • memory/3592-56-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/3592-72-0x0000000004EF0000-0x0000000004F00000-memory.dmp

                  Filesize

                  64KB

                • memory/3592-62-0x0000000005520000-0x0000000005B38000-memory.dmp

                  Filesize

                  6.1MB

                • memory/3592-75-0x0000000004F40000-0x0000000004F7C000-memory.dmp

                  Filesize

                  240KB

                • memory/4632-74-0x0000000005180000-0x0000000005190000-memory.dmp

                  Filesize

                  64KB

                • memory/4632-70-0x00000000029E0000-0x00000000029E6000-memory.dmp

                  Filesize

                  24KB

                • memory/4632-69-0x0000000073C50000-0x0000000074400000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4632-78-0x0000000073C50000-0x0000000074400000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4632-66-0x0000000000840000-0x0000000000870000-memory.dmp

                  Filesize

                  192KB

                • memory/4632-80-0x0000000005180000-0x0000000005190000-memory.dmp

                  Filesize

                  64KB