Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:55

General

  • Target

    e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe

  • Size

    1.5MB

  • MD5

    8fde3216e73d756d94ba8e15320501fa

  • SHA1

    247978fa6f3bb3f35054d83b48d7a9c53d32e85c

  • SHA256

    e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1

  • SHA512

    2ef546b5120aa44843ba0333082306f818bed77c64a274eeabb26a0e1f020016eedddcc0cdb074caf08c0d236ebe3ae17fc6e6c0e188e3d221c307a5a3e3731e

  • SSDEEP

    24576:NyFZjHfm47W10kxzv7SDFyMr8JC0dzCHDRwTeFq9HA7Yxm5NPwl:ozjHfm4aTxzv7SYcMASTaQxm5NI

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe
    "C:\Users\Admin\AppData\Local\Temp\e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hM8MO0HH.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hM8MO0HH.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TV0Xa7Bv.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TV0Xa7Bv.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:532
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bg7ip6MY.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bg7ip6MY.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2332
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JM7zm1Od.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JM7zm1Od.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4240
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1pZ36YP1.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1pZ36YP1.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3456
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:3504
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xt303sh.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xt303sh.exe
                6⤵
                • Executes dropped EXE
                PID:3704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hM8MO0HH.exe

      Filesize

      1.3MB

      MD5

      1c0d9af819cf3897dba318dfdd3f2144

      SHA1

      de965fc89f14faff830011170e9907ac404941ee

      SHA256

      84b80038724ed8b3b0a2c4d4ab9f8ff63f6cafda1ed0501aa62b12ee3e21a141

      SHA512

      bf116742ec44216191670877703b8ae86ff54267d794ad68e3bc5d5b5c2e9ab7d57c4ce44c33e5bcf3c48bbca7987046a40d32a6d48fb51f7b9ff79361335a64

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TV0Xa7Bv.exe

      Filesize

      1.2MB

      MD5

      61e454b7082a71aa961ae347e18f7ace

      SHA1

      4034c83996f018e6f61fbfc55f908c7b27360223

      SHA256

      f41f53cdc3886c1309baa7fdf6abf4ba4451c975d88aeb61d53066cdecf7160e

      SHA512

      0a73f7f274e544ee1727cc3ffef900b6344ef4113461226f9cea6a870f71a1aefb4febb5c5aa855bd76989e166ebf9f8b0a70afd033359721bea125becdc6dbf

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bg7ip6MY.exe

      Filesize

      761KB

      MD5

      ddb027bd044817d47ab24044373323c5

      SHA1

      51b220bacd81d1e6e007941fb7cd9e6fd49c1b7b

      SHA256

      25333906f25486771d7c537a3530aeffeb64792729fe713bd1c4d2f5dc6b44cd

      SHA512

      90d20a58f498b2e69706fc767ce9cbf4ff5a3791ead3dbd76fc57c8a79c5c031a8ca97eaa13e0dcb961622e49ead3965c80df8d3416d4a7541bc066bc8d2b3f8

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JM7zm1Od.exe

      Filesize

      565KB

      MD5

      b74cfc0a0207c582921e896638d0741f

      SHA1

      61a4550862c494d7051dd2b4af093df37b4d59e6

      SHA256

      2bd117e1a78c5f98156f91a4aa479de25795d26f21bd9780bdb981c373a0238a

      SHA512

      e904c8c659a31fe189a3818fc1e5f5a02ec8d6701c2795b6461ebababa2e227a86493e0f7268d1fdbdbd5aa48ff5d8944f9eb8dbed1d9dcf759a256ad388f575

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1pZ36YP1.exe

      Filesize

      1.1MB

      MD5

      35675cf37bd56208a02fef8ca5ef9ae6

      SHA1

      cf4698b94a76490f3bad33806f3596b7909fe5ac

      SHA256

      726c63af44686aa39f64a6af8916bb7cb226be2882b8c1c81941305b597887aa

      SHA512

      f0d8013ab8ffd6667bcaa34391e80250f34f25d8a6872a2d20084b092b0fe8002f261001fa25876ecb6dd2ba7b2e25cba292e1b74282b3c3b0f36072c4b00f6c

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xt303sh.exe

      Filesize

      221KB

      MD5

      1d2cb41ec32c0bd63299dc264427f10c

      SHA1

      cac5b6f4b6f6470b39874a55bad9f95eb3e7b4ee

      SHA256

      29cdc6560875c26c691b5f34244d4d52c4c12c5150e64abac0c2f2206623fb84

      SHA512

      1815588ae3f5aeb4ab780d53a028a895a97ad08cde91f946db68a3e8c14f4907d2b98866f9b67839a6331c6a871640751bbb1db040d3492fee4e93e4be5c3351

    • memory/3504-37-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3504-39-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3504-35-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3704-42-0x00000000007A0000-0x00000000007DE000-memory.dmp

      Filesize

      248KB

    • memory/3704-43-0x0000000007A60000-0x0000000008004000-memory.dmp

      Filesize

      5.6MB

    • memory/3704-44-0x0000000007550000-0x00000000075E2000-memory.dmp

      Filesize

      584KB

    • memory/3704-45-0x0000000004AC0000-0x0000000004ACA000-memory.dmp

      Filesize

      40KB

    • memory/3704-46-0x0000000008630000-0x0000000008C48000-memory.dmp

      Filesize

      6.1MB

    • memory/3704-47-0x00000000078E0000-0x00000000079EA000-memory.dmp

      Filesize

      1.0MB

    • memory/3704-48-0x0000000007750000-0x0000000007762000-memory.dmp

      Filesize

      72KB

    • memory/3704-49-0x00000000077D0000-0x000000000780C000-memory.dmp

      Filesize

      240KB

    • memory/3704-50-0x0000000007810000-0x000000000785C000-memory.dmp

      Filesize

      304KB