Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:47

General

  • Target

    5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe

  • Size

    912KB

  • MD5

    5f4de66cb9b1568753b8a44fad14b23e

  • SHA1

    e2c294ab014a574e4b8ea8d65f2ae46af5f3713e

  • SHA256

    5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a

  • SHA512

    acd31c122a20e8a77ab2f170f783679a2924d1dc958b32f384474590a0ea90c525976ce1c7ccd5be82098d2cee90bbfc9293ebae89a86fe3919ee929cd2265e0

  • SSDEEP

    12288:hMrMy9025kLy2eMdZp7L5QvRc/3aVqtmikIDH3qh5LAYUKEnIqHF+x7SB/h5vs6:FyT5tAf5Qk3CqtwUa/LAHn1HF+1SB1

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe
    "C:\Users\Admin\AppData\Local\Temp\5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9609062.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9609062.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3537467.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3537467.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4553268.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4553268.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4940
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7015082.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7015082.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4596
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4544
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 212
                6⤵
                • Program crash
                PID:4252
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2779192.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2779192.exe
              5⤵
              • Executes dropped EXE
              PID:1756
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4596 -ip 4596
      1⤵
        PID:3980

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9609062.exe

        Filesize

        810KB

        MD5

        66f7f8baa8e1ae254d925d449c8e3c53

        SHA1

        ed6c763314fb4123d472e6b5528056505761e79c

        SHA256

        dda98b7031f2c6d93883b6412395567def11c58eb7ec49a23783187c8f88b0d2

        SHA512

        4108b3774a162430c09e1bd71bfce56e71854b1871d7eb3061a948ae5ed3b8511f530af9b28bbdf24054a5881b862b4e623a0d04c81a1de709ff1571658de14f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3537467.exe

        Filesize

        547KB

        MD5

        2a9a0f177a18efc4637d0fd3899e0a27

        SHA1

        112d8b5d3e840eb9be5043cbf9a371560403dc76

        SHA256

        4c1096497fe933093803640bfebddbce9349f21741e627f51650ab6fafdb4c59

        SHA512

        f362fd8c1104f25a6b7e6277c981335ce021de18f125b3051ed5e2d08a2a1cc541ccfcfda5465c3c9ae08555fac3b1af19154c9c4eb52eca00251e31bc7aa30a

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4553268.exe

        Filesize

        381KB

        MD5

        faa93c16778a1368d978b6102a4e3da8

        SHA1

        25bd3a9bbd31743cf5fbb5c0fd00251af74cb326

        SHA256

        6bd4b1c650e8a3770f508e4aa6e8468e6d1d6f2872fd51974f2d7b857a5ffe50

        SHA512

        d9c2637e28c5e0cc051d98b6ab364ecdd109e3cc870520554eee6a67229bb0c5e9ad5908741f4b9d1add5f31a02ff6268fe99817bd55e7b1ecfee35d687c66a9

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7015082.exe

        Filesize

        346KB

        MD5

        07fde6b1142b5ed94e1eee5acec4f438

        SHA1

        1557ed8a1f8e8ca8a53cbad2adb5b087c84ab581

        SHA256

        e74cee163ea262850a9925f6ff1ee63415d0c26ee75b45f9395aa8c36c938b5d

        SHA512

        0e91c2a62062e9d1f5ce2fad436956f39b117d7789da91fbc586539162f87842017157036cb1eab9910fbf5a014c146a1062bb8e880b90a7cd0c2ed25e409a1b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2779192.exe

        Filesize

        174KB

        MD5

        bc9f0aa9d56d5695f7a12e8b50ec383f

        SHA1

        a4b1a4586098e52860a88bd72d4096cea5f4e0a6

        SHA256

        7dba4fdbffbfec09028375424ac35e581d60c8f9d1c9c7c7a17815c0d500f23e

        SHA512

        e863353a5ef207448ede278331775d86813593e334ca38d46d1f3cdfac74a0493889b409b1bc8eccbd31be05f2a3d11b53194283a40a979b6eb57642594102f7

      • memory/1756-36-0x00000000031B0000-0x00000000031B6000-memory.dmp

        Filesize

        24KB

      • memory/1756-35-0x0000000000CE0000-0x0000000000D10000-memory.dmp

        Filesize

        192KB

      • memory/1756-37-0x0000000005DA0000-0x00000000063B8000-memory.dmp

        Filesize

        6.1MB

      • memory/1756-38-0x0000000005890000-0x000000000599A000-memory.dmp

        Filesize

        1.0MB

      • memory/1756-39-0x00000000057B0000-0x00000000057C2000-memory.dmp

        Filesize

        72KB

      • memory/1756-40-0x0000000005810000-0x000000000584C000-memory.dmp

        Filesize

        240KB

      • memory/1756-41-0x00000000059A0000-0x00000000059EC000-memory.dmp

        Filesize

        304KB

      • memory/4544-29-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/4544-31-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/4544-28-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB