Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:40

General

  • Target

    9270cb48ef49ae030430c2bd7e18a87fbd6d168cbe4d15f9e272f075b605d296.exe

  • Size

    1.5MB

  • MD5

    fe3fd68024dd5be5908f425eda17b034

  • SHA1

    6856965d9651bd4970c3f4ca1be34913d43ae88f

  • SHA256

    9270cb48ef49ae030430c2bd7e18a87fbd6d168cbe4d15f9e272f075b605d296

  • SHA512

    fafe21586377d4181b4ffe6d2b31c0ed4f6de866ca375da28d49b75e4599924b410f74be907683e9b3ad2129f3bf0940a591af29fcb86521771ca9e896177366

  • SSDEEP

    24576:xyL7EvC4xauMWNWNmVq0FFiAIqHBHufJDwTqbaaJiWJ9KM0mhIUgRwg+plfbWUgj:kLI1ZMWNWNsixqHBHufJFaaJipDmhE+m

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9270cb48ef49ae030430c2bd7e18a87fbd6d168cbe4d15f9e272f075b605d296.exe
    "C:\Users\Admin\AppData\Local\Temp\9270cb48ef49ae030430c2bd7e18a87fbd6d168cbe4d15f9e272f075b605d296.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ej5ue1yl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ej5ue1yl.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vW4up9ZY.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vW4up9ZY.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gY7Xv1rg.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gY7Xv1rg.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN0ZE5uT.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN0ZE5uT.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4420
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ep59OD9.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ep59OD9.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:5080
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:3208
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 592
                  7⤵
                  • Program crash
                  PID:4988
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ho762xL.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ho762xL.exe
                6⤵
                • Executes dropped EXE
                PID:3716
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5080 -ip 5080
      1⤵
        PID:1956

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ej5ue1yl.exe

        Filesize

        1.3MB

        MD5

        f360ff9945205a7aa813570b0dab5b01

        SHA1

        0b90d442120f2db841b6ea1dac81f5ccf4611977

        SHA256

        836f1604f861ec6d139045bac1ecdf2260a366e84c9e26408399f8c1b319b056

        SHA512

        15d2dfad0cdcbc114abec7d8a197a57609a03d3cf2f60cb8cd9116766679fe6ca3d9ecb3941e3c87ae65c85ceb51d7b26b6e4817af9edb2502b96861ff7db154

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vW4up9ZY.exe

        Filesize

        1.2MB

        MD5

        075cb28d347bb8a04ebc57eee40bf93d

        SHA1

        547007817bcc7e2b5aa307f36893a81b73fdc4f3

        SHA256

        ef07177b865d965b0eb81e8319f853aa699e4f618f4581b215f1bb432aec7d31

        SHA512

        0bb49a71156469d33b11606608e32f899c0fafcd27cbb0b89d66e306dae4d195d6b7ebde288b0f040e04646f2ea057b4efd07fc38331d05465f307b501847b0e

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gY7Xv1rg.exe

        Filesize

        763KB

        MD5

        12d1a5c50774eefd4d34523af10e83bc

        SHA1

        ea9cd736a948680364dc041423da83e599d482a4

        SHA256

        313457b2359d7df1b778ce253a7473dfc6794c7931933c30aecc3fe72407c10b

        SHA512

        e4616ea8d7850f6509fbc2b628a6691c77113d5247fdc2279bb964ee6d395cb403aa2edd299587dbaedbf9a202075a238343ead7d14a5571fec37eb44c5fed5b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN0ZE5uT.exe

        Filesize

        566KB

        MD5

        084c5acadac95a4630610a9037030da5

        SHA1

        e2fef2da7aa8003bb873bf085974bfe24279097e

        SHA256

        2b8b0d32a65d19717baae28cc0964e132c9bcfaea0ef3d5c00f48ed4ce79741a

        SHA512

        53750ed046707525de8de5ce44848bb4a7c4bd46a64f75f5f17cea36ee9e7791066b9c3b81be2159c4a4a23541ce14694337d65e9dcd5d46dff16de9664a22c2

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ep59OD9.exe

        Filesize

        1.1MB

        MD5

        8a4f92e7bae66ff53f4af5d0b94d7f0b

        SHA1

        4a3e2802afd48fddcad3b3badc28261aac260ea7

        SHA256

        791eedb3d2a4b678426283d48a53a6b1d9a1e059d5ca71c942b4b854ea4f2cc5

        SHA512

        1d2140f8792e3ab56e1fbd956f4b2cc7a31efa698284644a858c43e373b2053840d76870a45eeac43cae5eca9bd6b9c2b1f5704e26b0b2c0732f0bec0fe96027

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2ho762xL.exe

        Filesize

        222KB

        MD5

        f5ecf747328f6ae62e3186a62a04ce48

        SHA1

        2d59858b8fc49aa56bfb132abcfdcd06e0c290ab

        SHA256

        245f23eb091b083038df5685ed7f5a4dc0fde67ea212a90cb559c0e90a3abdc5

        SHA512

        6a2cf674d233d75ebc31247571241b64e074ace26586652f5810d440069bb92cd88071fa3af57181150ce01fe6ed54fde4136912d5b0e424e95f249d7f0806a2

      • memory/3208-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3208-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3208-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3716-42-0x0000000000640000-0x000000000067E000-memory.dmp

        Filesize

        248KB

      • memory/3716-43-0x0000000007A50000-0x0000000007FF4000-memory.dmp

        Filesize

        5.6MB

      • memory/3716-44-0x0000000007540000-0x00000000075D2000-memory.dmp

        Filesize

        584KB

      • memory/3716-45-0x0000000002860000-0x000000000286A000-memory.dmp

        Filesize

        40KB

      • memory/3716-46-0x0000000008620000-0x0000000008C38000-memory.dmp

        Filesize

        6.1MB

      • memory/3716-47-0x0000000007820000-0x000000000792A000-memory.dmp

        Filesize

        1.0MB

      • memory/3716-48-0x0000000007740000-0x0000000007752000-memory.dmp

        Filesize

        72KB

      • memory/3716-49-0x00000000077A0000-0x00000000077DC000-memory.dmp

        Filesize

        240KB

      • memory/3716-50-0x0000000007930000-0x000000000797C000-memory.dmp

        Filesize

        304KB