Analysis

  • max time kernel
    299s
  • max time network
    302s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-04-2024 14:02

General

  • Target

    c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe

  • Size

    1.2MB

  • MD5

    7d57b9e5ff073b06d62cea316f77e6c8

  • SHA1

    4c278f1c0ca982da691ad5cf0e0bdf35df43398e

  • SHA256

    c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788

  • SHA512

    5d90ec0db399769d744fccba0120bc63d6b7e4e852e0b02df27def04d2e7a9a307a20d7c667de1daab6077c5c8c826f559508a60c11e5e8990da51c3f9d5e7c8

  • SSDEEP

    24576:xyjZtJ0RMymoUv1LUyJXL3YXYDjduCDZZMwPs3:kjZz0ePoUvKoLSipDZZMwU

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
    "C:\Users\Admin\AppData\Local\Temp\c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wJ0fd45.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wJ0fd45.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bL8eQ94.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bL8eQ94.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eJ0Un33.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eJ0Un33.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xV7880.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xV7880.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4468
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1140
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:4832
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3gR32Ml.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3gR32Ml.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:804
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:3308
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 568
                      7⤵
                      • Program crash
                      PID:1336
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nN703ND.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nN703ND.exe
                4⤵
                • Executes dropped EXE
                PID:2896

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wJ0fd45.exe
          Filesize

          1020KB

          MD5

          2c277e93930fdf344061b9de61da43fd

          SHA1

          19deab510aff019844306bd8e8382764cdb31044

          SHA256

          8e5bdce1b78f27ce3332001426b1d1f1e332f122fe11506ed12e7c1994ea6143

          SHA512

          db960983d0b8c99b2434147e27cb433e1206a8cb4aca871f804d1eee615f569141fcbb6bad927fac53f99429c0fe5716a53aefde398312a404c604d86e77233a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bL8eQ94.exe
          Filesize

          894KB

          MD5

          b2e12a91c45628da38bda44827b28c85

          SHA1

          e1c0b727d1c4f30bd7082fbd435625375e1e4726

          SHA256

          99c587206075544ce20344ba152632324dc3474f183d572e4f3915021ff92ae0

          SHA512

          771727e0820e143a579d3b4b0d34bb02b10818a6017a7a9cb9b52c9f597817d068a4a3e841740091d9fba0c21894a1c5e99ba9c6f53ee9098bd6a4a7ad75a888

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nN703ND.exe
          Filesize

          724KB

          MD5

          0e634b03cd7c3c28376c6827ba622bed

          SHA1

          086b92b865a929f5e46e8bcb63af56ba5fdae551

          SHA256

          d0b66e11cc4db7ddb80bdaec5c0147f9c77f418904843fb6bf26da594be2430e

          SHA512

          9c28317a13f0edefcc586a946c464b78b21582cc155a0bb08097b8b8515a88d32c222279970440028167cea8df4fa982a90e6962372727afbe0e6ace360c93b5

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eJ0Un33.exe
          Filesize

          431KB

          MD5

          c1569c5d9cd8d2de907c09f8e295a575

          SHA1

          15320dccccb378a900b0edb20b0305138a060e1d

          SHA256

          ba299e3de116ce40ca647721f90927f02497e5d93a2617249dbaff6f8d30317b

          SHA512

          07631ec9e2ffcacd4fd8a462df285e85ffe0fff79f78727cafdd663c3fc09528535887c095b3b178ef4925b845e7ee94cec20d33952d1ac185c6999f64772c92

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xV7880.exe
          Filesize

          415KB

          MD5

          394523fe5c26046b08d7bb19138a9106

          SHA1

          fdba9cd03ae4efc39be033654b7042b471219f54

          SHA256

          a89756fa3413156c01245e1e4b37658ea988e4836685d0d2b914351e89a68679

          SHA512

          e70623387ca8141ee22d394df30bff370a984988a2a69270624dfee23f2d2f86f69bc4d1b0802597f8cc1ca1654dd206c394248d413c0b635947c19cb1953ac2

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3gR32Ml.exe
          Filesize

          378KB

          MD5

          5399d9e4522f87f272dc87f13d62a23c

          SHA1

          8fb9f17db86b086948cb2f17f00760fb5d29066e

          SHA256

          3ca8e335e9aa746e8d61d35e117bd4d05b8b6d68fc0da50c7cfeacf6cd9f69b2

          SHA512

          ac62cc79388fd01b5149c90a22b68b05c5b71fb07fdf91813b0bd18bb4688e513cc3dc5babc2779ded7e8300ca17bd1fef7c86127d6f6d768d0dbe49c661f882

        • memory/3308-75-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/3308-73-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/3308-72-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/3308-67-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/4832-39-0x000000000C610000-0x000000000CC16000-memory.dmp
          Filesize

          6.0MB

        • memory/4832-40-0x000000000B8C0000-0x000000000B9CA000-memory.dmp
          Filesize

          1.0MB

        • memory/4832-41-0x000000000B7F0000-0x000000000B802000-memory.dmp
          Filesize

          72KB

        • memory/4832-42-0x000000000B850000-0x000000000B88E000-memory.dmp
          Filesize

          248KB

        • memory/4832-43-0x000000000B9D0000-0x000000000BA1B000-memory.dmp
          Filesize

          300KB

        • memory/4832-54-0x00000000731F0000-0x00000000738DE000-memory.dmp
          Filesize

          6.9MB

        • memory/4832-38-0x0000000009120000-0x000000000912A000-memory.dmp
          Filesize

          40KB

        • memory/4832-37-0x000000000B600000-0x000000000B692000-memory.dmp
          Filesize

          584KB

        • memory/4832-36-0x000000000BB00000-0x000000000BFFE000-memory.dmp
          Filesize

          5.0MB

        • memory/4832-35-0x00000000731F0000-0x00000000738DE000-memory.dmp
          Filesize

          6.9MB

        • memory/4832-28-0x0000000000400000-0x000000000043C000-memory.dmp
          Filesize

          240KB