Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:50

General

  • Target

    0e4f6fa259d45f6b8b8d2e708ff9cac68a58307c15686d384502402302d450f8.exe

  • Size

    762KB

  • MD5

    7552519f9996f9c76b4162aabc6f39dd

  • SHA1

    74e8494962b80dbe582f10c4ac392e91b67c54f1

  • SHA256

    0e4f6fa259d45f6b8b8d2e708ff9cac68a58307c15686d384502402302d450f8

  • SHA512

    290e4daa6c737ba8eaf8e416257263a346054f48758b9324d2ce302fc1860b1d7545d00e4ac93637b92849a64939455953c2795ffaea559df0a09a878f990e66

  • SSDEEP

    12288:JMrPy90ST157TEsGSsGzE0iIRF/qONhX5jtAh7WpBQnzxsVkXkxcCdnIfY7:myVBqS+NWgONhXXOq/OzxsVykKSIg7

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e4f6fa259d45f6b8b8d2e708ff9cac68a58307c15686d384502402302d450f8.exe
    "C:\Users\Admin\AppData\Local\Temp\0e4f6fa259d45f6b8b8d2e708ff9cac68a58307c15686d384502402302d450f8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZH2QY4Bs.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZH2QY4Bs.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1QI40Dk2.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1QI40Dk2.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:1336
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 540
              5⤵
              • Program crash
              PID:2808
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Qe360zH.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Qe360zH.exe
          3⤵
          • Executes dropped EXE
          PID:4984
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1336 -ip 1336
      1⤵
        PID:3116
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4196,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4032 /prefetch:8
        1⤵
          PID:4308

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZH2QY4Bs.exe
          Filesize

          565KB

          MD5

          79bf53ff0535bbad9ca539de3f151adc

          SHA1

          d14e7131fc4764e5635936cecf98ef371ad85216

          SHA256

          19d368444bf5c9063d1fe49d4bbd452a541ca99391b9ef9fe1644bc2c87dd557

          SHA512

          7310fe08160a637af9630732a5b930fc0cbffc0542a8352f6f93b1672b3cb8e8c4cce381f8b607cd5667e932ad398d0adabc4e83f562ddec194bb143e3a6e687

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1QI40Dk2.exe
          Filesize

          1.1MB

          MD5

          28f936b324d45522e840ef77b8d08943

          SHA1

          afe1dee65f78d50b65b418b027302ff43af9db04

          SHA256

          c8ae8ce4f6b7d270e92f7ef2be2af84a17785acf408142ebb11ce2474f552bb6

          SHA512

          7ca28d9a32fc6049b4a16efac745ef84a1953978c0dfb3c2f7a07b6ed7e32b63a36427ad01c4507f5ef2457dc24fe25792b5f48e43c1e45dc4479bcc1883f228

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Qe360zH.exe
          Filesize

          221KB

          MD5

          50a908f4f51d2c28893e3b333bfaf97a

          SHA1

          a29d7b48c81024d88d9b68d5b8c3041f90d1815e

          SHA256

          7b2f70f8087e5cca29c19a436a6dda7ed2288e46cca93137b1ec07dad4bd8a9b

          SHA512

          3ab930d5a2ff14a37e3bfd492f9876ae0c5d3aa7be94fb2b73478c3ee915d06db84a42434c83245a02f6f5710bd532c947328462a51cd9dff5b7b4593a29fd90

        • memory/1336-14-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/1336-17-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/1336-16-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/1336-19-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/4984-23-0x0000000007690000-0x0000000007C34000-memory.dmp
          Filesize

          5.6MB

        • memory/4984-22-0x0000000000340000-0x000000000037E000-memory.dmp
          Filesize

          248KB

        • memory/4984-24-0x0000000007180000-0x0000000007212000-memory.dmp
          Filesize

          584KB

        • memory/4984-25-0x0000000000B90000-0x0000000000B9A000-memory.dmp
          Filesize

          40KB

        • memory/4984-26-0x0000000008260000-0x0000000008878000-memory.dmp
          Filesize

          6.1MB

        • memory/4984-27-0x0000000007500000-0x000000000760A000-memory.dmp
          Filesize

          1.0MB

        • memory/4984-28-0x0000000007160000-0x0000000007172000-memory.dmp
          Filesize

          72KB

        • memory/4984-29-0x0000000007350000-0x000000000738C000-memory.dmp
          Filesize

          240KB

        • memory/4984-30-0x0000000007390000-0x00000000073DC000-memory.dmp
          Filesize

          304KB